Teaching Exploration and Practice of Integrating into Ideological and Political Education in the Course of Technology of Applied Cryptogram
Download PDF
$currentUrl="http://$_SERVER[HTTP_HOST]$_SERVER[REQUEST_URI]"

Keywords

Ideological and political education
Technology of applied cryptogram
Cryptography
Teaching method

DOI

10.26689/ssr.v4i8.4168

Submitted : 2022-07-13
Accepted : 2022-07-28
Published : 2022-08-12

Abstract

This paper summarizes and classifies the teaching contents of technology of applied cryptogram course according to the knowledge points. At the same time, the ideological and political elements of the course are designed from the following perspectives; (1) Abiding laws and regulations, and using cryptographic technology for the protection of network security; (2) Enabling students to firmly establish the belief that “core technology should be independent, and China’s science and technology should be self-improvement.” Further, the ideology and political elements are integrated into different teaching contents according to the knowledge points around these two themes. This course balances the relationship among ideology and morality, knowledge ability and quality. It not only focuses on improving students’ learning interest and ability, but also cultivates students to establish the correct outlook on life and values. The practical application shows that the overall effect is good. 

References

Yan G, 2021, Application of Information Encryption Technology in Computer Network Security. International Journal of Computational and Engineering, 6(4): 126-128.

Yi Z, Jianhua F, Xiaoxin C, et al., 2021, Machine Learning Aided Key-Guessing Attack Paradigm Against Logic Block Encryption. Journal of Computer Science and Technology, 36(5): 1102-1117. https://org.doi/10.1007/S11390-021-0846-6

Aghili SF, Sedaghat M, Singelee D, et al., 2022, MLS-ABAC: Efficient Multi-Level Security Attribute-Based Access Control scheme. Future Generation Computer Systems, 131: 75-90. https://org.doi/10.1016/J.FUTURE.2022.01.003

Xin Z, Xiaoling, 2022, Thoughts on Vulnerability Security by Ransomware Virus. International Journal of Social Science and Education Research, 5(1): 120-124. https://doi.org/10.6918/ IJOSSER.202201_5(1).0019

El AS, Lozi R, Puech W, 2022, Special Issue on Cryptography and its Applications in Information Security. Applied Sciences, 12(5): 2588-2591. https://org.doi/10.3390/APP12052588

Galdi C, Kolesnikov V, 2022, Special issue: Security and Cryptography for Networks-SCN 2020. Journal of Computer Security, 30(1): 1-2. https://org.doi/10.3233/JCS-219000

Guru A, Ambhikar A, Cardenas AA, et al., 2021, A Study of Cryptography to Protect Data from Cyber-crimes. Research Journal of Engineering and Technology, 11(2): 45-48.

Yijun Y, Fei C, Zhiwei S, et al., 2019, Secure and Efficient Parallel Hash Function Construction and Its Application on Cloud audit. Soft Computing, 23(18): 8907-8925. https://org.doi/10.1007/s00500-018-3489-y

Yousef AH, Mohamed FI, 2019, Reducing Hash Function Complexity: MD5 and SHA-1 as Examples. International Journal of Mathematical Sciences and Computing, 5(1): 1-17.

Yuan Q, Tibouchi M, Abe M, 2022, On Subset-Resilient Hash Function Families. Designs, Codes, and Cryptography, 2022(90): 719-758. https://org.doi/10.1007/s10623-022-01008-4