A new character-level encryption algorithm: how to implement cryptography in an ICT classroom

It is evident that the society in which we live will demand more and more qualified and specialized positions in the different branches of engineering. Now we are in a highly digitized world in which information is continuously transmitted through data communication networks with the expectation of...

Full description

Saved in:
Bibliographic Details
Published inJournal of Technology and Science Education Vol. 9; no. 3; pp. 257 - 268
Main Author Arboledas Brihuega, David
Format Journal Article
LanguageEnglish
Published JOTSE: Journal of technology and science education 2019
Journal of Technology and Science Education
OmniaScience
Subjects
Online AccessGet full text
ISSN2013-6374
2014-5349
2013-6374
DOI10.3926/JOTSE.491

Cover

Abstract It is evident that the society in which we live will demand more and more qualified and specialized positions in the different branches of engineering. Now we are in a highly digitized world in which information is continuously transmitted through data communication networks with the expectation of security and confidentiality. Students who are in their last year at high school face the problem of deciding their professional future. Therefore, there is a wide field of research for them in cryptographic techniques. In this work we have developed, together with a group of high school students, a cryptographic algorithm with substitution and transposition techniques as described by Feistel (1973) in order to create a more comprehensive knowledge about what they have been studying in their ICT subjects. In most cases the teaching methods are based on the teachers' own vision, as well as on the absence of knowledge of alternative methods and/or the impossibility of applying them physically in the classroom. With the active and cooperative methodology put forward in this work, objectives such as hard work, autonomous and collaborative learning and the exchange of knowledge have been absolutely fulfilled. Achieving them requires replacing traditional methods so that the student can adapt to new work challenges. A group of students, only three of whom finished, were voluntarily provided with the mentoring service in which the algorithm was designed. As a result, we were able to program in Python as a final project a symmetrical character-level encryption algorithm we've referred to as Azrael. Our findings indicate a demand for future endeavours to take into account the need for more projectbased work in ICT classrooms. The exchange of ideas between teacher and students has been the driven force behind the success of this activity
AbstractList Students who are studying their last year at High School face the problem of deciding their professional future. It is evident that the society in which we live will demand more and more qualified and specialized positions in the different branches of engineering.The aim of this paper is to explain how we solved a real problem - ensuring the confidentiality of information - with the knowledge acquired by students during their two years studying information and communication technologies (ICT).Three brilliant students were voluntarily provided with the mentoring service in which the algorithm was designed. As a result, we could design a symmetrical character-level encryption algorithm in the classroom as a final project that we named Azrael.Unfortunately, we did not have any scholarships or funding to do the extra work we had to do, only the personal satisfaction of seeing how the different skills were successfully applied to solve a real problem.
Students who are studying their last year at High School face the problem of deciding their professional future. It is evident that the society in which we live will demand more and more qualified and specialized positions in the different branches of engineering. The aim of this paper is to explain how we solved a real problem - ensuring the confidentiality of information - with the knowledge acquired by students during their two years studying information and communication technologies (ICT). Three brilliant students were voluntarily provided with the mentoring service in which the algorithm was designed. As a result, we could design a symmetrical character-level encryption algorithm in the classroom as a final project that we named Azrael. Unfortunately, we did not have any scholarships or funding to do the extra work we had to do, only the personal satisfaction of seeing how the different skills were successfully applied to solve a real problem.
It is evident that the society in which we live will demand more and more qualified and specialized positions in the different branches of engineering. Now we are in a highly digitized world in which information is continuously transmitted through data communication networks with the expectation of security and confidentiality. Students who are in their last year at high school face the problem of deciding their professional future. Therefore, there is a wide field of research for them in cryptographic techniques. In this work we have developed, together with a group of high school students, a cryptographic algorithm with substitution and transposition techniques as described by Feistel (1973) in order to create a more comprehensive knowledge about what they have been studying in their ICT subjects. In most cases the teaching methods are based on the teachers' own vision, as well as on the absence of knowledge of alternative methods and/or the impossibility of applying them physically in the classroom. With the active and cooperative methodology put forward in this work, objectives such as hard work, autonomous and collaborative learning and the exchange of knowledge have been absolutely fulfilled. Achieving them requires replacing traditional methods so that the student can adapt to new work challenges. A group of students, only three of whom finished, were voluntarily provided with the mentoring service in which the algorithm was designed. As a result, we were able to program in Python as a final project a symmetrical character-level encryption algorithm we've referred to as Azrael. Our findings indicate a demand for future endeavours to take into account the need for more project-based work in ICT classrooms. The exchange of ideas between teacher and students has been the driven force behind the success of this activity
It is evident that the society in which we live will demand more and more qualified and specialized positions in the different branches of engineering. Now we are in a highly digitized world in which information is continuously transmitted through data communication networks with the expectation of security and confidentiality. Students who are in their last year at high school face the problem of deciding their professional future. Therefore, there is a wide field of research for them in cryptographic techniques. In this work we have developed, together with a group of high school students, a cryptographic algorithm with substitution and transposition techniques as described by Feistel (1973) in order to create a more comprehensive knowledge about what they have been studying in their ICT subjects. In most cases the teaching methods are based on the teachers' own vision, as well as on the absence of knowledge of alternative methods and/or the impossibility of applying them physically in the classroom. With the active and cooperative methodology put forward in this work, objectives such as hard work, autonomous and collaborative learning and the exchange of knowledge have been absolutely fulfilled. Achieving them requires replacing traditional methods so that the student can adapt to new work challenges. A group of students, only three of whom finished, were voluntarily provided with the mentoring service in which the algorithm was designed. As a result, we were able to program in Python as a final project a symmetrical character-level encryption algorithm we've referred to as Azrael. Our findings indicate a demand for future endeavours to take into account the need for more projectbased work in ICT classrooms. The exchange of ideas between teacher and students has been the driven force behind the success of this activity
Audience High Schools
Secondary Education
Author Arboledas Brihuega, David
Author_xml – sequence: 1
  fullname: Arboledas Brihuega, David
BackLink http://eric.ed.gov/ERICWebPortal/detail?accno=EJ1215310$$DView record in ERIC
BookMark eNp9kVGLEzEQgBc5wfO8B3-AkFfFPZNNNknFl1LqXY-DA62PEmans21KdrNkt5b-e9e2FH3xaYaZbz6GmdfZVRtbyrK3gt_JSaE_PT4vv8_v1ES8yK4LLmSupVFXf-Wvstu-9xUvC8NtYe119nPKWtoz3EACHCjlgX5RYNRiOnSDjy2DsI7JD5vmM9vEPRsi800XqKF2YEcorhN0mwPzI9uyxWzJMEDfpxibN9nLGkJPt-d4k_34Ol_OHvKn5_vFbPqUoxRG5FKbFVpFFogs1qYESdJU5QQn1pYIpAvQRFgVRFKQBj3hptZcWxRmVdbyJlucvKsIW9cl30A6uAjeHQsxrR2kwWMgZywSlLbkfFUpVBUopbVCURlUmhsYXV_OLg-hpeFf3bm2a33ycQuOejf9tuScCyWMNGYc_3Aa37UdHPYQwkUguPvzJreNQ09ufNMIvzvBlDxeuPmjKEQpBR_77099THG8KNX_dX08s_0O3fjNeNz4mCAMlwNIPW6q5G9_q7CH
ContentType Journal Article
Copyright LICENCIA DE USO: Los documentos a texto completo incluidos en Dialnet son de acceso libre y propiedad de sus autores y/o editores. Por tanto, cualquier acto de reproducción, distribución, comunicación pública y/o transformación total o parcial requiere el consentimiento expreso y escrito de aquéllos. Cualquier enlace al texto completo de estos documentos deberá hacerse a través de la URL oficial de éstos en Dialnet. Más información: https://dialnet.unirioja.es/info/derechosOAI | INTELLECTUAL PROPERTY RIGHTS STATEMENT: Full text documents hosted by Dialnet are protected by copyright and/or related rights. This digital object is accessible without charge, but its use is subject to the licensing conditions set by its authors or editors. Unless expressly stated otherwise in the licensing conditions, you are free to linking, browsing, printing and making a copy for your own personal purposes. All other acts of reproduction and communication to the public are subject to the licensing conditions expressed by editors and authors and require consent from them. Any link to this document should be made using its official URL in Dialnet. More info: https://dialnet.unirioja.es/info/derechosOAI
Copyright_xml – notice: LICENCIA DE USO: Los documentos a texto completo incluidos en Dialnet son de acceso libre y propiedad de sus autores y/o editores. Por tanto, cualquier acto de reproducción, distribución, comunicación pública y/o transformación total o parcial requiere el consentimiento expreso y escrito de aquéllos. Cualquier enlace al texto completo de estos documentos deberá hacerse a través de la URL oficial de éstos en Dialnet. Más información: https://dialnet.unirioja.es/info/derechosOAI | INTELLECTUAL PROPERTY RIGHTS STATEMENT: Full text documents hosted by Dialnet are protected by copyright and/or related rights. This digital object is accessible without charge, but its use is subject to the licensing conditions set by its authors or editors. Unless expressly stated otherwise in the licensing conditions, you are free to linking, browsing, printing and making a copy for your own personal purposes. All other acts of reproduction and communication to the public are subject to the licensing conditions expressed by editors and authors and require consent from them. Any link to this document should be made using its official URL in Dialnet. More info: https://dialnet.unirioja.es/info/derechosOAI
DBID 2VB
ADOGN
AFIUA
AAYXX
CITATION
ERI
GA5
ADTOC
UNPAY
AGMXS
FKZ
DOA
DOI 10.3926/JOTSE.491
DatabaseName RACO Revistes Catalanes amb Accés Obert
Revistes Catalanes amb Accés Obert (RACO) (Abstracts)
Revistes Catalanes amb Accés Obert (RACO)
CrossRef
ERIC
ERIC - Full Text Only (Discovery)
Unpaywall for CDI: Periodical Content
Unpaywall
Dialnet (Open Access Full Text)
Dialnet
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
ERIC
DatabaseTitleList CrossRef

ERIC


Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: ERI
  name: ERIC
  url: https://eric.ed.gov/
  sourceTypes: Open Access Repository
– sequence: 3
  dbid: UNPAY
  name: Unpaywall
  url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/
  sourceTypes: Open Access Repository
DeliveryMethod fulltext_linktorsrc
Discipline Sciences (General)
Mathematics
EISSN 2013-6374
ERIC EJ1215310
EndPage 268
ExternalDocumentID oai_doaj_org_article_78cea58500db4c4ba44664c1b7c4607a
oai_dialnet_unirioja_es_ART0001417377
10.3926/jotse.491
EJ1215310
10_3926_jotse_491
oai_raco_cat_article_364174
GroupedDBID 2VB
5VS
ABOPQ
ADBBV
ADOGN
AFIUA
ALMA_UNASSIGNED_HOLDINGS
BCNDV
GROUPED_DOAJ
KQ8
KWQ
M~E
OK1
AAYXX
CITATION
AAHSB
ERI
GA5
ADTOC
IPNFZ
RDL
RIG
UNPAY
AGMXS
FKZ
ID FETCH-LOGICAL-c3171-367dc84e8aee8cf75a3e37b59c9885cae62a6eecb2ee31e6a6907f6068c17d5f3
IEDL.DBID ERI
ISSN 2013-6374
2014-5349
IngestDate Fri Oct 03 12:48:55 EDT 2025
Thu Jul 20 13:40:58 EDT 2023
Mon Sep 15 10:08:30 EDT 2025
Fri Oct 03 12:21:52 EDT 2025
Tue Jul 01 01:08:43 EDT 2025
Tue Jan 28 21:04:28 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 3
Language English
License http://creativecommons.org/licenses/by-nc/4.0
cc-by
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c3171-367dc84e8aee8cf75a3e37b59c9885cae62a6eecb2ee31e6a6907f6068c17d5f3
Notes JOTSE: Journal of technology and science education; No. 3 (2019): 2019, Vol. 9. núm. 3
JOTSE: Journal of technology and science education; Núm. 3 (2019): 2019, Vol. 9. núm. 3
2014-5349
2013-6374
ORCID 0000-0001-8922-1632
OpenAccessLink http://eric.ed.gov/ERICWebPortal/detail?accno=EJ1215310
PageCount 12
ParticipantIDs doaj_primary_oai_doaj_org_article_78cea58500db4c4ba44664c1b7c4607a
dialnet_primary_oai_dialnet_unirioja_es_ART0001417377
unpaywall_primary_10_3926_jotse_491
eric_primary_EJ1215310
crossref_primary_10_3926_jotse_491
csuc_raco_oai_raco_cat_article_364174
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2019-00-00
PublicationDateYYYYMMDD 2019-01-01
PublicationDate_xml – year: 2019
  text: 2019-00-00
PublicationDecade 2010
PublicationTitle Journal of Technology and Science Education
PublicationYear 2019
Publisher JOTSE: Journal of technology and science education
Journal of Technology and Science Education
OmniaScience
Publisher_xml – name: JOTSE: Journal of technology and science education
– name: Journal of Technology and Science Education
– name: OmniaScience
SSID ssib052708288
ssj0000740176
ssib044745859
Score 2.0725312
Snippet It is evident that the society in which we live will demand more and more qualified and specialized positions in the different branches of engineering. Now we...
Students who are studying their last year at High School face the problem of deciding their professional future. It is evident that the society in which we...
SourceID doaj
dialnet
unpaywall
eric
crossref
csuc
SourceType Open Website
Open Access Repository
Index Database
Publisher
StartPage 257
SubjectTerms Active Learning
Azrael
Coding
Computer Science Education
Confidentiality
Cooperative Learning
Cryptography
Cryptography, Azrael, symmetrical character-level encryption algorithm, substitution-permutation network, ICT
Curriculum Implementation
High School Students
ICT
Information Security
level encryption algorithm
Mathematics
permutation network
Programming Languages
Student Attitudes
Student Projects
substitution
symmetrical character
Technology
SummonAdditionalLinks – databaseName: DOAJ Directory of Open Access Journals
  dbid: DOA
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrZ1Nb9QwEIYttBe4IApUhLbIoiDBITQf_ki4larVthKcWqkXZNmTCaTaJtVuVlX_PePEG20PiAuHSJHlOM7YsZ9xJq8Z-0BUDIQNMq6TEshBcUnsfKyrc3VdSekJ1y8NfP-h5lfi4lpeb2315WPCRnng0XBHugC0xLRJUjkBwln_AVJA6jQIlegBjZKi3HKmhjHYbzSn1SglRAigjm66foVfRJk-moBmsFoDoa__SaPFPgj3T7HPT9ftnX24t4vF1qRz9oI9D7TIj8da7rAn2L5kO-F9XPFPQTT68yv285gTIHPY6C_HCx8NxCnf8mEYFbhd_OqWTf_79iufd_e873hzG4LH-ZApiFfzhvK2_PzkksMGrV-zq7PTy5N5HLZOiIGAII1zpSsoBBYWsYBaS5tjrp0soSwKCRZVZhUiuAwxT1FZ7yTX5MwUkOpK1vkum7Vdi28Yh6rOtMwAK0InOpzNHCZViViWIs-SiL3f2NPcjQoZhjwLb3QzGN2Q0SP20VvakAk64xWthxOwvQntbHIlyDmKmAxNMZXlc2_S1m2zbLoba3BliPcHBy_VudYR--Yb7vFFPoG60nSLf3WliO36Zp8KOb3w0hvEvxE7nDrC35_x7f-owx57RkhWjos8-2zWL9d4QNjTu3dDD_8DGjoCoQ
  priority: 102
  providerName: Directory of Open Access Journals
– databaseName: Unpaywall
  dbid: UNPAY
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9QwELbQ9gAXoEBFeFQWDwkO2c3DjhNu26rVUomKQ1cqB2TZkwmkbJNqN6uq_HrGiXdFkZAQh0iWNXHiGSf5PnvymbE3hIqBYIMMq6gAIig2Cq3LdbW2qkopHcJ1UwOfTrPZXJycy3M_4bbyaZUXbbfCfhW_Vwx0MhGTvm7ivTkpnZB8a8qJKOKJcGKfO5kkLD5iO_PTz9Mvbkc5t21BlvYyzFQWoUxFMUgLESTIhgbHoohvfZBGsFoDQWH300aDnRfy3-ZC3103V-bm2iwWv32Ejh8wvbn9Iffkx3jd2TH8_EPZ8f_795Dd9_iUTweTXXYHm0ds178BVvydl6l-_5h9nXKC5Bw2is_hwuUfcbJb3vTvIW4W39pl3X2__MBn7TXvWl5f-nR13ht5uWxek23DPx6ecdiA-Sdsfnx0djgL_WYNIRAEicM0UyXkAnODmEOlpEkxVVYWUOS5BINZYjJEsAliGmNmHC2viD7lEKtSVukeGzVtg08Zh7JKlEwASwJrdFiTWIzKArEoRJpEAXu1iZi-GjQ5NHEZF1bd-1GT2wL21sVSkwta7TS0-wKYTnsn6zQTRMcCJn2wt205603duqmXdXthNK40MYyeUsYqVSpgB25o3D7JVVBct5dQOaAhQhZFpRVAHXGr5wJiq0BkkTIB23MDa9vI0YkT-yDEHbDX26H29z4--yer5-wePQDFMG_0go265RpfEpLq7L5_XH4BZj4h6g
  priority: 102
  providerName: Unpaywall
Title A new character-level encryption algorithm: how to implement cryptography in an ICT classroom
URI https://raco.cat/index.php/JOTSE/article/view/364174
http://eric.ed.gov/ERICWebPortal/detail?accno=EJ1215310
https://www.jotse.org/index.php/jotse/article/download/491/403
https://dialnet.unirioja.es/servlet/oaiart?codigo=7637835
https://doaj.org/article/78cea58500db4c4ba44664c1b7c4607a
UnpaywallVersion publishedVersion
Volume 9
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAFT
  databaseName: Open Access Digital Library
  customDbUrl:
  eissn: 2013-6374
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0000740176
  issn: 2013-6374
  databaseCode: KQ8
  dateStart: 20110101
  isFulltext: true
  titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html
  providerName: Colorado Alliance of Research Libraries
– providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 2013-6374
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0000740176
  issn: 2013-6374
  databaseCode: DOA
  dateStart: 20110101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 2013-6374
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssib044745859
  issn: 2014-5349
  databaseCode: M~E
  dateStart: 20110101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3Pb9MwFLagHAoHxK-JbFBZ_DgGktiOE24l6lQqOpBopXFAlu28jE4lmdJU0y787TynaaCHSRwSRZbtyM8v9ve92J8JeYOo2CJsEH4RpBYJigl849a6GlMUuRAO4brQwPwsni757Fyc_w1d_O-KypkTRWBua9VdxNSHrIdzyREE97O0iKTTaWvPpkNC4AvG053GEGKD-P3sy-Lb5B1PwyEZ9vUezFIDu9laxMduJ0cJTafu3y-QHm7LK31zrdfrf2am00fkYQcp6XjnA4_JHSifkAfzXo9185T8GFMczWi2V2f2P7u1QnRS2vqmHTPoeH1R1avm568PdFpd06airW6wix3SzGXqpK3pqqS6pJ-yBc32wPsZWZ5OFtnU7w5W8C3ChdBnscxtwiHRAIktpNAMmDQitWmSCKshjnQMYE0EwEKItaPQBVKdxIYyFwU7IoOyKuE5oTYvIikiCzkCK7yMjgwEeQqQppxFgUde7Q2prnb6GQp5h7O8uqyaDSi0vEfeOhMrNEGlnN51-2B1o7rPR7GYI3XyiOj6oK_L5d6nbctVvaoutYKNQjbQ0r9QMik98tH12GEhl1DVF_0rZGJBo98EQW64xYa4P93chkZaHgdSe-TI9XdfSe8rHnnde8DtbTy-rfgJuY9ume7COi_IoKm38BKBTmNGbYBg1Do33ue_JyNyb3n2dfz9D7cP-3k
linkProvider ERIC Clearinghouse on Information & Technology
linkToUnpaywall http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9QwELbQ9gAXoEBFeFQWDwkO2c3DjhNu26rVUomKQ1cqB2TZkwmkbJNqN6uq_HrGiXdFkZAQh0iWNXHiGSf5PnvymbE3hIqBYIMMq6gAIig2Cq3LdbW2qkopHcJ1UwOfTrPZXJycy3M_4bbyaZUXbbfCfhW_Vwx0MhGTvm7ivTkpnZB8a8qJKOKJcGKfO5kkLD5iO_PTz9Mvbkc5t21BlvYyzFQWoUxFMUgLESTIhgbHoohvfZBGsFoDQWH300aDnRfy3-ZC3103V-bm2iwWv32Ejh8wvbn9Iffkx3jd2TH8_EPZ8f_795Dd9_iUTweTXXYHm0ds178BVvydl6l-_5h9nXKC5Bw2is_hwuUfcbJb3vTvIW4W39pl3X2__MBn7TXvWl5f-nR13ht5uWxek23DPx6ecdiA-Sdsfnx0djgL_WYNIRAEicM0UyXkAnODmEOlpEkxVVYWUOS5BINZYjJEsAliGmNmHC2viD7lEKtSVukeGzVtg08Zh7JKlEwASwJrdFiTWIzKArEoRJpEAXu1iZi-GjQ5NHEZF1bd-1GT2wL21sVSkwta7TS0-wKYTnsn6zQTRMcCJn2wt205603duqmXdXthNK40MYyeUsYqVSpgB25o3D7JVVBct5dQOaAhQhZFpRVAHXGr5wJiq0BkkTIB23MDa9vI0YkT-yDEHbDX26H29z4--yer5-wePQDFMG_0go265RpfEpLq7L5_XH4BZj4h6g
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+new+character-level+encryption+algorithm%3A+How+to+implement+cryptography+in+an+ICT+classroom&rft.jtitle=Journal+of+technology+and+science+education&rft.au=David+Arboledas&rft.date=2019&rft.pub=OmniaScience&rft.eissn=2013-6374&rft.volume=9&rft.issue=3&rft.spage=257&rft.epage=268&rft_id=info:doi/10.3926%2Fjotse.491&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_78cea58500db4c4ba44664c1b7c4607a
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2013-6374&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2013-6374&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2013-6374&client=summon