Teaching Public-Key Cryptography in School

These days, public-key cryptography is indispensable to ensure both confidentiality and authenticity in numerous applications which comprise securely communicating via mobile phone or email or digitally signing documents. For all public-key systems, such as RSA, mathematically challenging and technically involved methods are employed which are often above the level of secondary school students as they employ deep results from algebra. Following an approach suggested in 2003 by Tim Bell et al. in Computers and Education, volume 40, number 3 , we deal with the question of how to teach young students the main concepts, issues, and solutions of public-key systems without being forced to also teach rather complicated theorems of number theory beforehand.

[1]  Harold W. Thimbleby,et al.  Explaining cryptographic systems , 2003, Comput. Educ..

[2]  Ian H. Witten,et al.  Computer Science Unplugged: off-line activities and games for all ages , 1998 .

[3]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[4]  P. Cull,et al.  Perfect codes on graphs , 1997, Proceedings of IEEE International Symposium on Information Theory.

[5]  Juraj Hromkovic Algorithmic Adventures - From Knowledge to Magic , 2009 .

[6]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[7]  Arto Salomaa,et al.  Public-Key Cryptography , 1996, Texts in Theoretical Computer Science. An EATCS Series.

[8]  Yasushi Kuno,et al.  New Methodology of Information Education with "Computer Science Unplugged" , 2008, ISSEP.

[9]  Friedrich L. Bauer,et al.  Decrypted secrets - methods and maxims of cryptology , 1997 .

[10]  Helmut Knebl,et al.  Introduction to Cryptography , 2002, Information Security and Cryptography.

[11]  Helmut Knebl,et al.  Introduction to Cryptography , 2002, Information Security and Cryptography.

[12]  Peter B. Henderson,et al.  Computer Science unplugged , 2008 .

[13]  Don Coppersmith,et al.  Matrix multiplication via arithmetic progressions , 1987, STOC.

[14]  Roland T. Mittermeir,et al.  Informatics Education - Supporting Computational Thinking, Third International Conference on Informatics in Secondary Schools - Evolution and Perspectives, ISSEP 2008, Torun, Poland, July 1-4, 2008, Proceedings , 2008, ISSEP.