A simulation game for teaching secure data communications protocols

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

4 Downloads (Pure)


With the widespread commercial use of the Internet, secure data communications over the Internet has become an important aspect of business operations. Thus, it is an important study for information technology and management students. The Security Protocol Game is an interactive group activity for exploring secure data communication protocols. Using pen and paper, envelopes and game tokens, students simulate security protocols and possible attacks against them. The game provides simple and intuitive representations for cryptographic methods, including both public key and secret key techniques. Using these representations, students can simulate Internet application protocols such as Pretty Good Privacy (used to secure email) and Transport Layer Security (used for secure web transactions). They can explore well-known protocols for authentication, key exchange and blind signatures. Students can also develop and test their own protocols using public key certificates, encrypted key transmission, tunnelling and other well-known techniques. Through this learning activity, students gain a deep understanding of how security protocols operate and are designed. The game has been used in tertiary units of study for managers and information technology students.
Original languageEnglish
Title of host publicationCelebrating teaching at Macquarie
Place of PublicationNorth Ryde, NSW
PublisherMacquarie University
ISBN (Print)1864087935
Publication statusPublished - 2002
EventCelebrating Teaching at Macquarie - Macquarie University, Sydney, Australia
Duration: 28 Nov 200229 Nov 2002


ConferenceCelebrating Teaching at Macquarie
CityMacquarie University, Sydney, Australia

Bibliographical note

Publisher PDF allowed as per publisher agreement.


  • simulation games
  • cryptography

Fingerprint Dive into the research topics of 'A simulation game for teaching secure data communications protocols'. Together they form a unique fingerprint.

Cite this