Visualizations in CrypTool

Visualizations (interactive demonstrations) are implemented for the following topics:

  1. creating an electronic signature,

  2. processing hybrid encryption,

  3. how changes to a document change the hash value

    1. sensitivity of hash algorithms,

    2. generation of hash value collisions (birthday paradox),

  4. processing the Diffie-Hellman key exchange,

  5. side-channel attack,

  6. authentication protocols,

  7. shared secret using

    1. Chinese Remainder Theorem,
    2. Shamir,

  8. 3D visualization of big sets of random numbers.

You can access to these visualisations via the following menu items:

  1. Individual Procedures \ RSA Demonstration \ Signature Demonstration (Signature Generation)

  2. Crypt \ Hybrid Demonstration \ Hybrid Encryption (after that the result of the hybrid encryption is displayed in a window. For this window you can call the hybrid decryption via the menu Crypt \ Hybrid Demonstration \ Hybrid Decryption).

  3. How changes of a document change the hash value

    1. Individual Procedures \ Hash \ Hash Demonstration

    2. Individual Procedures \ Attack on the hash value of the digital signature

  4. Individual Procedures \ Diffie-Hellman Demonstration

  5. Analysis \ Asymmetric Encryption \ Side-Channel Attack on "Textbook RSA"

  6. Individual Procedures \ Protocols \ Network Authentication

  7. Shared Secret

    1. Individual Procedures \ Secret Sharing Demonstration (Shamir)

    2. Individual Procedures \ Chinese Remainder Theorem Applications \Secret Sharing by CRT

  8. Analysis \ Analyse Randomness \ 3D Visualization