Visualizations in CrypTool
Visualizations (interactive demonstrations) are implemented for the following
topics:
-
creating an electronic signature,
-
processing hybrid encryption,
-
how changes to a document change the hash value
-
sensitivity of hash algorithms,
-
generation of hash value collisions (birthday paradox),
-
processing the Diffie-Hellman key exchange,
-
side-channel attack,
-
authentication protocols,
-
shared secret using
-
Chinese Remainder Theorem,
-
Shamir,
-
3D visualization of big sets of random numbers.
You can access to these visualisations via the following menu items:
-
Individual Procedures \ RSA Demonstration \
Signature Demonstration (Signature Generation)
-
Crypt \ Hybrid Demonstration \
Hybrid Encryption (after that the result of the hybrid encryption is
displayed in a window. For this window you can call the hybrid decryption via
the menu Crypt \ Hybrid Demonstration \ Hybrid Decryption).
-
How changes of a document change the hash value
-
Individual Procedures \ Hash \
Hash Demonstration
-
Individual Procedures \ Attack on the hash value
of the digital signature
-
Individual Procedures \ Diffie-Hellman
Demonstration
-
Analysis \ Asymmetric Encryption \
Side-Channel Attack on "Textbook RSA"
-
Individual Procedures \ Protocols \ Network
Authentication
-
Shared Secret
-
Individual Procedures \ Secret Sharing
Demonstration (Shamir)
-
Individual Procedures \ Chinese Remainder Theorem Applications \Secret
Sharing by CRT
-
Analysis \ Analyse Randomness \
3D Visualization