The Security Protocol Game

The Security Protocol Game is a highly visual and interactive game for teaching secure data communication protocols. Students use the game to simulate protocols and explore possible attacks against them. The power of the game lies in the representation of secret and public key cryptography. Specifically, the game provides representations for plain text and encrypted messages, message digests, digital signatures and cryptographic keys. Using these representations, students can construct public key certificates and perform multiple encryption, tunnelling and encrypted key transmission. They can simulate a wide range of protocols including authentication and key exchange protocols. Application protocols such as Transport Layer Security (formerly Secure Sockets Layer, SSL) and Pretty Good Privacy (PGP) can be simulated in detail. The game clearly reveals the key issues of confidentiality, integrity, authentication and non-repudiation in secure data communications. Used as a small group learning activity, students gain a deep understanding of protocol design and operation issues. The game is suitable for use in tertiary and professional education courses for managers and information technology students at all levels.

Plain text, public and private key encryption and secret key encryption.
Some of the representations in the security protocol game.

For Students

Read the rules of the security protocol game in preparation for your class.

For Instructors

Make your own game kits to use with your students. Access to all game resources including rules and instructions for preparing game kits.

More Information

Read about the security protocol game. Discover how it has been used and see examples of how it operates.

If you find the game useful, please link to the security protocol game home page.