Primena kriptografskog modela zaštite podataka u grupnom radu studenata

Uzdanica XVIII 2 (2021), (str. 273-288)

AUTOR(I): Suzana M. Đorđević, Verica R. Milutinović

E-ADRESA: suzana.djordjevic@pefja.kg.ac.rs

Download Full Pdf 

DOI: 10.46793/Uzdanica18.II.273DJ

SAŽETAK:

Cilj ovog rada je razvijanje kriptografskog modela za zaštitu podataka i pomaganje grupi studenata u donošenju odluka. Grupni radovi su sve češći izbor nastavnika u proveri znanja studenata, a zbog sve šire upotrebe interneta, kao i pandemije kovida 19, grupni radovi su se preusmerili na onlajn oblik rada. Kako bi se sprečilo moguće prepisivanje u grupama i razmirice između članova grupe, potrebno je razviti sistem koji će štititi podatke, ali i dozvoliti članovima grupe da na dobrovoljan, solidaran i demokratičan način postignu dogovor. Jedno od mogućih rešenja daje korišćenje kriptografije. Za potrebe razvijanja kriptografskog modela korišćena su polja Galoa GF(256) i razvijane su matematičke operacije na polju polinoma u GF(256). Zatim je u model implementiran Lagranžov interpolacioni polinom, koji omogućava nastavniku da generiše uređene parove koji predstavljaju deo ključa. U ovom radu razvijen je jedan takav model i prikazan pseudoalgoritam za dati model. Takođe, dat je primer primene u nastavi programiranja.

KLJUČNE REČI:

kriptografija, polja Galoa, Lagranžova interpolaciona formula, nastava programiranja, grupni rad.

LITERATURA:

  • Aho, Hopkroft (1974): A. Aho, J. Hopcroft, The Design and Analysis of Computer Algorithms, Massachusetts: Addison-Wesley Longman.

    Alen, Simen (2008): E. Allen, J. Seaman, Staying the course: Online education in the United States, Sloan Consortium, PO Box 1238, Newburyport, MA 01950.

  • Alen, Bourhis, Barel, Marbri (2002): M. Allen, J. Bourhis, N. Burrell, E. Marbry, Comparing Student Satisfaction With Distance Education to Traditional Classrooms in Higher Education: A Meta-Analysis, American Journal of Distance Education, 16(2), 83−97.
  • Argote, Gruenfeld, Nakuin (2001): L. Argote, D. H. Gruenfeld, C. Naquin, Group learning in organizations, In: M. E. Turner (Ed.), Groups atwork: Advances in theory and research, Mahwah, NJ: Lawrence Erlbaum Associates, 369–411.
  • Bejti, Ulasevic (2006): B. Beatty, C. Ulasewicz, Faculty perspectives on moving from Blackboard to the Moodle learning management system, TechTrends, 50(4), 36‒45.
  • Kostelo (2013): E. Costello, Opening up to open source: Looking at how Moodle was adopted in higher education, Open Learning: The Journal of Open, Distance and e- Learning, 28(3), 187‒200.
  • Daemen, Rijmen (2002): J. Daemen, V. Rijmen, The Design of Rijndael ‒ AES ‒ The Advanced Encryption Standard, Berlin: Springer-Verlag.
  • Dejvis (1997): D. Davies, A brief history of cryptography, Information Security Technical Report, 2(2), 14‒17.
  • De Bor (1987): C. de Boor, B-form basics, Wisconsin univ ‒ Madison Mathematics Research Center.
  • Desoki, Ashikmin (2006): A. Desoky, A. Ashikhmin, Cryptography Software System using Galois Field Arithmetic, 2006 IEEE Information Assurance Workshop, West Point, NY: IEEE, 386‒387.
  • Dojumgač, Tanhan, Kimaz (2020): İ. Doyumğaç, A. Tanhan, M. S. Kiymaz, Under- standing the Most Important Facilitators and Barriers for Online Education during COV- ID-19 through Online Photovoice Methodology, International Journal of Higher Education, 10(1), 166‒190.
  • Duli (2008): J. F. Dooley, History of cryptography and cryptanalysis: Codes, Ci- phers, and their algorithms, Springer.
  • Eskobar-Rodrigez, Monž-Lozano (2012): T. Escobar-Rodriguez, P. Monge-Lo- zano, The acceptance of Moodle technology by business administration students, Comput- ers & Education, 58(4), 1085–1093.
  • Hart, Novocin (2011): W. Hart, A. Novocin, Practical Divide-and-Conquer Algo- rithms for Polynomial Arithmetic, In: V. P. Gerdt, W. Koepf, E. W. Mayr, E.V. Vorozhtsov (Eds.), Computer Algebra in Scientific Computing. CASC 2011. Lecture Notes in Computer Science, vol 6885, Berlin, Heidelberg: Springer.
  • Husien (2011): K. A. Hussien, The Lagrange Interpolation Polynomial for Neural Network Learning, International Journal of Computer Science and Network Security, 11(3), 255‒261.
  • Kalajdžić (2011): G. Kalajdžić, Algebra, Beograd: Zavod za udžbenike.
    Knut (1968): D. Knuth, The Art of Computer Programming, Volume 1: Fundamen- tal Algorithms, Massachusetts: Addison Wesley Longman.
    Knut (1997): D. Knuth, The Art of Computer Programming, volume 2: Seminumeri- cal Algorithms, Massachusetts: Addison-Wesley.
  • Kocaka, Bozana, Iuika (2009): Z. Koçaka, R. Bozana, Ö. Iúıka, The importance of group work in mathematics, Procedia Social and Behavioral Sciences 1, 2363–2365.
  • Kovač, Kovač, Fazekas (2005): A. Kovács, L. Kovács, F. Fazekas, The Lagrange Interpolation Formula in Determining the Fluid’s Velocity Potential through Profile Grids, Semantic Scholar, 26‒29.
  • Li (2010): J.-W. Lee, Online support service quality, online learning acceptance, and student satisfaction, Internet and Higher Education, 13, 277‒283.
  • Laki, Branam, Etčison (2019): A. Lucky, M. Branham, R. Atchison, Collection- Based Education by Distance and Face to Face: Learning Outcomes and Academic Dishon- esty, Journal of Science Education and Technology, 28(1), 414‒428.
  • Milovanović (1988): G. Milovanović, Numerička analiza II deo, Beograd: Naučna knjiga.
  • Milutinović, Đorđević (2019): V. Milutinović, S. Đorđević, Programiranje u Pajtonu sa zadacima za vežbanje, Jagodina: Fakultet pedagoških nauka Uni- verziteta u Kragujevcu.
  • Marfi, Robšo (2002): S. Murphy, M. J. Robshaw, Essential Algebraic Structure within the AES, Annual International Cryptology Conference, Berlin, Heidelberg: Springer, 1‒16.
  • Pan (2001): V. Pan, Structured matrices and polynomials: unified superfast algo- rithms, New York: Springer-Verlag.
  • Tanhan (2020): A. Tanhan, Utilizing online photovoice (OPV) methodology to ad- dress biopsychosocial spiritual economic issues and wellbeing during COVID-19: Adapting OPV to Turkish, Turkish Studies,15(4), 1029‒1086.
  • Vienović, Adamović (2013): M. Vienović, S. Adamović, Kriptologija I ‒ Osnove za analizu i sintezu šifarskih sistema, Beograd: Univerzitet Singidunum.
  • Egerić, Milutinović (2003): M. Egerić, V. Milutinović, Rešavanje problemskih zadataka uz pomoć kompjutera, Zbornik radova, 7, 293‒301. ISSN 0354-9895