Chapter 7 Analysis of the Instructional Design of An Interactive Multimedia Based Learning Environment for Teaching Cryptography Modern learning theory and existing paradigms of multimedia based learning environments have contributed to the design of the interactive multimedia based learning environment as an effective and stimulating learning tool. Therefore, I will first lay the groundwork by discussing the three most prominent learning theories: behaviorism, cognitivism and constructivism (section 7.1). I will then investigate their value for the tutorial design and explain why no single discussed learning theory is sufficient for the instructional design. However, I will explain why Dewey’s pragmatic approach lays the proper foundation for the design of the learning environment (section 7.2). Finally, accounting for specific learning conditions such as learning group, learning objectives and learner motivation, I will describe the design of the learning environment (in section 7.3). 7.1 Learning Theories Learning is essentially making and maintaining connections. Biologically through neural networks. Mentally through concepts, ideas and meanings. Experientially through interaction between the mind and the environment. For thousands of years, learning theories have attempted to reflect such complex processes. The evolution of learning theories has brought us to a more complete understanding of learning. Many theories have been created; only few (i.e. behaviorism, cognitivism and constructivism) have been widely recognized and used in educational settings. Learning theories are trendy in nature: they have provided adequate models for human learning at a given time and are usually replaced by more modern theories that enhance previous explanations. This cycle will very likely continue until we know which exact biological and cognitive processes are involved in human learning. Each learning theory seems to get us a step closer to this goal. I am mentioning this to caution that no learning theory fully reflects the complexity of the act of learning, however, each learning theory brings light to important aspects involved in learning. As one of the first modern learning theories, Behaviorism became popular during the 1950's when B.F. Skinner proposed his content centered, behavioral, preprogrammed method of educating American children. I will describe the behaviorist view of learning in section 7.1.1. While the behaviorist view concentrated on investigating the observable behavior of humans and animals resulting from exposure to different stimuli such as reinforcement, punishment and conditioning, the Cognitivist School acknowledged that each learner possesses a brain and mental processes formed the primary object of study. Thus, the Cognitivist school explored the human brain and mental processes as factors that were irrelevant in Behaviorist models. I will describe the Cognitivist School in section 7.1.2. Constructivism is the youngest learning theory. In constructivism, the objective character of behaviorism and cognitivism is replaced by the subjectivity of the 1 learner. The emphasis is placed on the individual that constructs knowledge or mental models through experiences in complex and authentic situations. Learning is viewed as the process of adjusting our mental models to accommodate new experiences. I will describe the constructivist view in section 7.1.3. 7.1.1 Behaviorism Central to the theory of behaviorism is the study of behaviors that can be observed and measured (Good & Brophy, 1990). The mind is perceived as a "black box" that acts in a deterministic manner: response B will occur given stimulus A. Thus, to provoke a desired behavior, the correct stimulus has to be given. Thorndike’s law of exercise resulted from the observation that the more a stimulus response bond is practiced the stronger it will become. He also found that this bond strengthens even more when positive rewards are involved and weakens when negative responses are involved. Behaviorist learning is viewed as a conditioned reflex that is acquired through interaction with the outer world. Teaching simply involves practicing the desired stimulus response relationships. The teacher knows what exactly the student has to learn and his efforts focus on how to teach. In his regard, behaviorism provides an authoritarian learning model: obedient student execution without reflection or critical thinking. Key behaviorist researchers: I. Pavlov, E. Thorndike, J. B.Watson and B.F. Skinner. Reflection: Behaviorism is concerned with regulation of learner’s behavior and not with cognitive processes inherent to humans. In that, behaviorism does not fully reflect human learning. Applying research on animal behavior (such as Pavlov’s dog experiments) to human behavior has to be limited. Behaviorist teaching methods seem to work best in creating desired behaviors and physical skills. The learner shall be able to respond instinctively to provided stimuli. For example, World War II pilots were conditioned to react to silhouettes of enemy planes. Such responses were supposed to occur automatically. A major limitation of behaviorist learning models is the inability to act in novel and unexpected situations that the learner is not trained for. 7.1.2 Cognitivism Cognitivism followed behaviorism in an attempt to find explanations to the limitations of behaviorism. For example, children do not necessarily behave in a way that was reinforced; they may alter their behavior contrary to the reinforcements or rewards. Cognitivism recognizes that humans can process information mentally and don’t act necessarily in a predictable trained manner. Cognitivism emphasizes the inner cognitive processes occurring between stimulus and response. Although different classifications of cognitivism exist all agree that human thinking involves some information processing abilities. This explains why computers appear to be appropriate models when examining human thinking processes such as learning, memorizing or recalling. 2 Cognitivist learning does not focus on provoking the correct answer that follows a given stimulus. Rather, students shall learn rules, formulas and terminologies that form cognitive capacities and create inert knowledge. Learners possess transformation and adaptation capacities. Typically, complex problems are subdivided and posed as simplified stand-alone problems to the learner. Students develop problem-solving skills that help solve such predefined problems in their own way. Key cognitivism researcher: J. Piaget, E. Tolman, D. Ausubel, J. Bruner, L. Vygotsky. Reflection: Cognitivism eliminates some of the limitations of behaviorist learning models. Learning also involves human cognitive capacities resulting in a variety of problem solving abilities. Learners apply their set of acquired rules to tackle even novel problems. The teacher-student is not authoritarian anymore, teachers act as advisors. They observe the learning process and possibly assist in solving the posed problem. While the limitations of behaviorism can be seen in its narrow focus on physical behavior, the limitations of cognitivism are rooted in its overemphasis of mental information processing. Situations that involve instinctive (physical) behavior cannot be explained. Additionally, authentic problems that are complex in nature and embedded in their contextual settings cannot be solved using cognitivist strategies. These are typically acquired in given isolated predigested settings and not in ill-defined complex settings that require a different type of strategies. 7.1.3 Constructivism As a philosophy of learning, constructivism can be traced at least to the eighteenth century and the work of the Neapolitan philosopher Giambattista Vico, who stated that humans can only clearly understand what they have themselves constructed. The fundamental difference to other learning theories is that constructivism denies the ability to objectively describe reality. Although reality may be objective in nature, we perceive it subjectively with our senses. Neurobiological evidence shows that we not only project reality but also interpret it at the same time (Anderson 1988). Therefore, constructivists believe that "learners construct their own reality or at least interpret it based upon their perceptions of experiences, so an individual's knowledge is a function of one's prior experiences, mental structures, and beliefs that are used to interpret objects and events… What someone knows is grounded in perception of the physical and social experiences which are comprehended by the mind." (Jonasson, 1991). Under the constructivist view, learning is seen as an active process in which humans construct knowledge in complex authentic situations. The fundamental basis of learning is discovery or reconstruction of knowledge. Learners will go through stages in which they develop, accept and, later on, reject their ideas. In the classroom, the teacher takes on the role as facilitator. He provides a classroom environment that allows learners to discover relationships and to develop ideas through activities that are of interest to them. 3 Problems shall be situated in realistic settings and connect to learner’s previous experiences and knowledge. The Assumptions of Constructivism (Merrill 1991) Knowledge is constructed from experience Learning is a personal interpretation of the world Learning is an active process in which meaning is developed on the basis of experience Conceptual growth comes from the negotiation of meaning, the sharing of multiple perspectives and the changing of our internal representations through collaborative learning Learning should be situated in realistic settings; testing should be integrated with the task and not a separate activity Key Constructivism researchers: L. Vygotsky, J. Bruner, J. Dewey, J. Piaget, S. Papert, E. von Glaserfeld. Reflection: The creation of knowledge is an individual process that can not be transmitted through a teacher. In that way, constructivism differs fundamentally from behaviorism and cognitivism. The focus is on learning as opposed to teaching; classes are student-centered and not teacher-centered. The teacher’s role shifts to that of a facilitator Since he may not know more than the learner, a solid amount of self confidence is needed. He considers how students learn, considers their beliefs and attitudes, thinks of learning as a process and supports cooperative learning. 7.1.4 Analysis of these Learning Theories The following overview of these three most popular learning theories shall outline their key foci. Schuhman summarized the three prominent theories as follows: Behaviorism: Based on observable changes in behavior. Behaviorism focuses on a new behavioral pattern being repeated until it becomes automatic. The mind is perceived as a black box, stimulus A produces response B. Cognitivism: Based on the thought process behind the behavior. Changes in behavior are observed, and used as indicators as to what is happening inside the learner's mind. Constructivism: Based on the premise that we all construct our own perspective of the world, through individual experiences and schema. Constructivism focuses on preparing the learner to problem solve in ambiguous situations. Figure 1: Behaviorism, Cognitivism and Constructivism – An Overview (Schuhman, 1996) 4 When considering the key concepts of the three learning theories together with their particular strengths and weaknesses, none of them appears to be appropriate for all educational settings. Depending on specific learning conditions such as the learner, the learning situation and the learning objectives, specific learning theories appear to be more suiting than others. Schwier (1995) states that: We must allow circumstances surrounding the learning situation to help us decide which approach to learning is most appropriate. It is necessary to realize that some learning problems require highly prescriptive solutions, whereas others are more suited to learner control of the environment. Any of the three learning theories may provide a meaningful and an appropriate model for an underlying learning situation. As long as their strengths and limitations are realized and their uses are newly assessed given the particular learning situation, their flexible combination can be very beneficial. If we want to our students to become self-driven autonomous learners that feel comfortable solving ill-defined problems in complex situations, constructivism should be our preferred learning model. Then, behaviorist and cognitivist models gain their significance by enabling the learner to reach that stage. It would be too farfetched to ask a learner to engage in the self-exploration of an unknown yet complex topic. Learning theories shall be related to educational content and expertise of the learner. Ertmer and Newby (1993) as described in Mergel (1998) match learning theories with the content to be learned as follows: A behavioral approach can effectively facilitate mastery of the content of a profession (knowing what). Behavioral tasks requiring a low degree of processing (e.g., basic paired associations, discriminations, rote memorization) seem to be facilitated by strategies most frequently associated with a behavioral outlook (e.g., stimulus-response, contiguity of feedback/reinforcement). Cognitive strategies are useful in teaching problem-solving strategies where defined facts and rules are applied in unfamiliar situations (knowing how). Cognitive tasks requiring an increased level of processing (e.g., classifications, rule or procedural executions) are primarily associated with strategies having a stronger cognitive emphasis (e.g., schematic organization, analogical reasoning, algorithmic problem solving). Constructivist strategies are especially suited to dealing with ill-defined problems through reflection-in-action. Constructive tasks demanding high levels of processing (e.g., heuristic problem solving, personal selection and monitoring of cognitive strategies) are frequently easiest learned with strategies advanced by the constructivist perspective (e.g., situated learning, cognitive apprenticeships, social negotiation.) Ertmer and Newby feel that the strategies promoted by different learning theories overlap (the same strategy for a different reason) and that learning theory strategies are 5 concentrated along different points of a continuum depending on the learner’s task knowledge and the level of cognitive processing required. Ertmer and Newby's suggestion that theoretical strategies can complement the learner's level of task knowledge, allows the designer to make the best use of the strategies provided by the different learning theories. With this approach the designer is able to draw from a large number of strategies to meet a variety of learning situations. 7.2 A Pragmatic Approach In designing instructional content, we shall not limit ourselves methodologically but rather be in a position that permits us to select the most suiting existing educational principles given the particular learning situation. Thus, we shall act pragmatically in a way that John Dewey proposed more than a century ago. John Dewey (1859-1952) was an American philosopher and educator who rejected authoritarian teaching methods. He was the founder of the “Experimental Laboratory School” and influential in the further development of constructivist learning models. He regarded education in a democracy as a tool to enable the citizen to integrate their culture and talents usefully. To accomplish those objectives, both curricula and pedagogical methods needed radical reform. Although not put forward by him, “learning by doing” within a dynamic social context describes Dewey's educational philosophy, called Pragmatism. Dewey's view of democracy as a primary ethical value permeated his educational theories. As one of the principal figures in the “Progressive Education Movement” from the 1880s to 1904, Dewey set the tone for educational philosophy as well as concrete school reforms. His reactions to the prevailing theories and practices in education and his corrections made to these philosophies were vital for the development of educational 6 thinking in the late nineteenth and early twentieth centuries. Dewey (1897) points out the major shortcoming of US schools in attempting to prepare the learner for later life: “I believe that much of present education fails because it neglects this fundamental principle of the school as a form of community life. It conceives the school as a place where certain information is to be given, where certain lessons are to be learned, or where certain habits are to be formed. The value of these is conceived as lying largely in the remote future the child must do these things for the sake of something else he is to do; they are mere preparation. As a result they do not become a part of life experience of the child and so are not truly educative.” Educational pragmatism does not add a new learning theory to the existing ones. It also does not value existing learning theories as good or bad, it rather classifies them as useful or not. As pragmatism (“Pragma”: greek for “Action” or “Practice”.) is guided by practical experience and observation rather than theory it asks “Does it work?" as opposed to "Is it right?" Educational pragmatism is rooted in the social context the learner finds himself: “True education comes through the stimulation of the child’s power by the demands of the social situations in which he finds himself.” (Dewey 1897). Therefore, learning objectives vary with the particular learner and are thus not absolute. Dewey emphasizes the relational character of objectives, means and consequences in education in his works. In particular, this means, that different children may learn different things in the same educational setting depending on their individual capacities, interests and habits. Dewey (1897) believes that “Education must be conceived as a continuing reconstruction of experience and that the process and the goal of education are one and the same.” The best preparation for life is obtained by providing an environment which places the learner in authentic situations and lets him act on them. “To prepare him for the future life means to give him command of himself; it means so to train him that he will have the full and ready use of all his capacities; that his eye and ear and hand may be tools ready to command, that his judgment may be capable of grasping the conditions under which it has to work, and the executive forces be trained to act economically and efficiently”. (Dewey 1879) Examinations are of use if they test his fitness for social life and detect areas in which he shall be supported. Pragmatism provides a template for educational settings by placing the learner in the center of all educational activities. Based upon the learner’s capabilities and his social situation, the teacher provides appropriate learning experiences. Such experiences are educational once reflected upon and its diversity help him prepare for life. To provide these experiences, no single learning theory shall solely be used from a pragmatic point of view. Rather, didactic decisions are solely based on the specific learning situation as defined by the learner, the social setting and subject matter. Constructivist, cognitive and behaviorist principles may be used in combination based upon their utility for particular educational experiences. In particular, this holds true for the design of multimedia based learning environments. Consequently, the selected media are a result of the desired learning situation to be 7 created. Kerres (2002) states that “The situation determines the value of the used media, not the media themselves…Media for themselves are of no value, they obtain their value through their usage by humans in their specific contexts at specific times. Teaching methods and media shall be employed in a “pragmatic” manner to produce the desired educational experiences. In particular, the learner shall be involved in activities that allow him to relate previous experiences to new ones. are authentic and of interest to him. provoke curiosity and the need to act. allow him to experience the consequences of his actions. require him to research and provoke original thoughts. don’t overwhelm the learner. He can manage the task or solve the problem. contribute to democratic and human structures in education. promote development of individual capacities. I will now proceed to the design of the interactive multimedia based learning environment for teaching cryptography. In order to properly use Dewey’s pragmatic approach, I will analyze the particular learning conditions in the following section. 7.3 Design of the Multimedia Based Learning Environment For a proper analysis of the particular learning conditions, I will use Kerres’ Guide for a media-didactic Conception (1999). This guide allows systematic analysis of the particular learning conditions as well as the reasons and functions of the used media. 7.3.1 Project Teaching Cryptography in an American High School using An Interactive Multimedia Learning Environment. 7.3.1.1 Brief Description of Project Cryptography is the art and science of encoding and decoding information. High School students at Antilles School in the U.S. Virgin Islands learn Cryptographic Methods and Applications through the use of an interactive Cryptography Tutorial. 7.3.1.2 Persons and Institutions involved Dr. Michael Hortmann, University of Bremen, Germany Salvatore Angilletta, University of Bremen, Germany. 7.3.1.3 Educational Setting Antilles School is a college-preparatory K-12 school with an enrolment of 503 students of wide ethnic background. The spoken language is American English. The school has 3 computer labs with 20 workstations each. The course takes place in the School’s library that runs Windows2000 on each of their 400MHz Celeron / 64MB RAM workstations. 8 7.3.1.4 Characterization of Learning Group Students that are part of this study are enrolled in the elective Advanced Placement Math classes. This learning group consists of 26 students whose ages range from 17 to 18 years. The students participating in this study are enrolled in Advanced Placement (AP) math classes in the school year 2002-2003. Advanced Placement math classes are elective courses that only students with a particular interest in Mathematics enroll. The study took place during the last two weeks of the school year after the students had completed their nation wide AP tests. 15 students are in 11th grade and are 17 years old, the other 11 students are 12th graders and are 18 years old. 13 students are male, 13 are female. Based upon a survey conducted before the study, the students using the tutorial had very little to no prior knowledge of cryptography. All students have experience in using the Internet, primarily to check email, to visit educational and recreational sites and to use Instant Messenger. The majority of students have limited experience in self-explorations and cooperative learning. Most students have been classmates for many years and have known each other very well. Moreover, all students appeared open-minded and ready to engage in the studies of cryptography. Learner Motivation: None of the students has systematically studied cryptography before. I therefore consider them novices in the field of cryptography. Because students are exposed to critical privacy issues in today’s Internet usage such as secure online payments, email privacy or using PIN’s for automatic teller machines, they - generally speaking - quickly develop an interest for cryptography. Others are familiar with historic cryptographic events (i.e. Enigma machine during WW2) or may have used cryptographic or stenographic methods in a playful manner. As students of elective Advanced Placement Math classes, they usually have a strong mathematical interest and a solid background equal to 12 years of High School Mathematics. 7.3.1.5 Learning Content and Learning Goals The security concerning online purchases (i.e. a book order at Amazon.com), sending an encrypted Email or performing an ATM money withdrawal depends upon encryption method that is utilized. As these technological conveniences become increasingly important in our modern society, the question ultimately arises: How much security do the utilized encryption methods offer? In order to effectively evaluate the integrity of an encryption method, it is essential to understand the underlying mathematics of the encryption method (“Cipher”). Thus, the focus of modern cryptography and, in particular, of this tutorial is testing the security of existing encryption methods and exploring their underlying mathematical methods. The following topics are studied within the tutorial: - Terminology used in Cryptography - Distinction between 1 and 2 Key Cryptography - Transposition Ciphers - Substitution Ciphers 9 - Applications of Cryptography - Caesar Cipher - The One Time Pad - Multiplication Cipher - Linear Cipher - Polyalphabetic Ciphers - RSA Ciphers - Cryptography Tools and Mathematical Tools on: - Modular Arithmetic - Euclidean Algorithm - Extended Euclidean Algorithm - Euler’s Phi Function - Euler’s Theorem - Letter Frequencies Counter - Crypto Calculator - Cipher Challenge The tutorial was designed to motivate and require the learner to study encryption methods and their underlying mathematical concepts. The listed ciphers and the chosen sequential order were purposely selected to achieve this goal. Starting with the simplest cipher and ending with the most complex cipher, the study of each cipher teaches a new mathematical concept required to understand the following ciphers and ultimately the most complex and prominent cipher, the RSA cipher. For example, one of the first ciphers to study is the Caesar Cipher that motivates learning the basics of modular arithmetic. Modular arithmetic itself is again the underlying mathematical concept of successive ciphers such as the RSA Cipher. These mathematical concepts are – in addition to the studied encryption methods - thoroughly explained in the “Crypto Tools” section of the tutorial. Through the detailed study of the mathematical background of cryptography, the learner realizes that cryptography is an application of the mathematical discipline Number Theory – a theory that may be considered the last “pure” mathematical discipline as it had virtually no real-life applications until Cryptographers (which are mainly Mathematicians) started using Number Theory theorems to devise secure ciphers. Central concepts of number theory are i.e. Euler’s Theorem and the Euclidean Algorithm with its Extension. Learning Goals The learning goals reflect the above-mentioned issues of modern cryptography. Central here are the mechanism and the security issues revolving around the studied encryption methods as well as their mathematical foundation. The learning goals are described on each tutorial page and can be categorized into two classes: procedural and communicative. Students shall not only develop the skills necessary to understand and devise elementary Ciphers, they should also be able to communicate and intelligently discuss cryptography-related issues such as the security of a studied or devised cipher. 10 The exercises provided on each page of the tutorial are designed to achieve the following learning goals: The students shall develop an understanding of the primary uses and applications of cryptography. be able to distinguish between one- and two-key cryptography. be able to distinguish between transposition and substitution ciphers. be able to develop transposition and substitution ciphers. know how to cryptoanalyze transposition as well as the learned mono- and polyalphabetic ciphers. know how to use a letter frequency counter. develop an understanding of the mathematical basis of the RSA cipher and its underlying security. be proficient in modular arithmetic. conceptually understand the Euclidean algorithm and its extension. be able to communicate and intelligently discuss the learned cryptographic concepts. 7.3.2 Didactic Media Cryptography is taught using “The Interactive Cryptography Tutorial” which provides a multimedia based learning environment designed by the author for this purpose. The tutorial is hosted on the school’s Internet server and thus is available to students from any campus computer as well as from home. 7.3.2.1 Reasons for using this Medium There is a vast body of research that suggests that Interactive Multimedia based Learning Environments can be very beneficial and effective. Firstly, the interactive nature of the tutorial provides an authentic coding environment. Students can actively participate in encoding and decoding processes. Secondly, in addition to discovering and verifying encryption mechanisms, students are given the opportunity to create their own encryption methods as well as breaking existing ones. Moreover, the Interactive Multimedia based Learning Environment provides a platform for self directed investigations. A vast number of links to cryptography related Internet websites are provided that permit students to explore aspects of interest in cryptography on their own. Altogether, the tutorial provides a student centered learning environment that can be used to develop a thorough understanding and appreciation of cryptography and its use. 7.3.2.2 Costs and Benefits of Project The time required to explain the usage and navigation through the tutorial is minimal. It does not pose any more difficult tasks than “surfing” the Internet. According to Kerres (2000), such skills are common place and may be considered as elementary culture techniques. 11 Benefits: closest way to simulate encoding and decoding in school settings. learning and reinforcing computer and Internet related skills important real life application of mathematics the hyperlinked learning environment provides immediate access to relevant Internet based cryptography information. Costs: Creation of learning environment is very time consuming; it also requires advanced web design skills. More than rudimentary understanding of mathematics encountered. 7.3.2.3 Function of Didactic Medium Introducing cryptography in form of a tutorial seemed most appropriate as it serves the following four important functions: Firstly, cryptography is the art and science of encoding and decoding information such as words or texts. This process shall be made accessible to the learner in a realistic setting. The interactive components of the tutorial provide the means for students to immediately test, falsify and confirm own ideas immediately. In addition to discovering existing ciphers interactively, students are given the opportunity to create their own encryption methods as well as break existing ones. Initial studies of cryptography shall consist of a high degree of interaction in order to develop a profound understanding of underlying cryptographic mechanisms. Ideally, by performing these cryptographic investigations, general encryption, decryption and cryptoanalytic methods are explored by each learner. Secondly, students have the option to do self-directed cryptography related studies on the Internet through the use of the tutorial. Each page contains hyperlinks that link to cryptography-related information on the Internet. In particular, the first section of the Tutorial (“Cryptography”) provides hyperlinks to a variety of historic, social and mathematical aspects of cryptography. Here, each learner has the opportunity to further explore uses, history or latest developments of cryptography that are of particular interest to him. I deem this section of the tutorial to be highly instrumental in allowing the learner to pursue that particular aspect of cryptography that is of most importance to him. Cryptography is a highly interdisciplinary conglomerate of history, mathematics and social sciences among which students shall be able to gain access and interest to cryptography through their avenue of choice. Moreover, performing self-directed cryptography related research on the Internet may be quite time consuming and not turn out to be successful as the Internet is itself an unorganized world. The tutorial provides order in the disorderly world of the Internet. 12 Students are usually only one mouse-click away from finding the desired outside information so that time efficient learning and research can take place. Thirdly, cryptography is intimately related to computer science. In practice, many aspects such as developing and testing ciphers as well as the art of breaking ciphers, called crypto-analysis, require the use of computers. Two examples are: Breaking the mono-alphabetic ciphers which involves counting the number of letters in a text. Performing an RSA Cipher requires the computation of two large prime numbers. Naturally, just as any cryptographer uses powerful computer tools, learners can use the power of computers as well. A lot of precious time would be lost if such time consuming tasks would be performed by hand. Fourthly, using interactive web pages to explore the mechanisms of Ciphers broadens the students’ abilities in making use of such digital media. Generally speaking, collegebound students are well-seasoned Internet surfers involving searching and navigating through the Internet, communicating interpersonally via Email and using Instant Messenger software. However, typically, such students have less experience in using interactive applications for the purpose of further exploring or discovering mathematical mechanisms. Commonly, the Internet is not used for inquiry-based tasks of a researcher. Such skills are formed and reinforced through the use of the tutorial. 7.3.3 Didactic Structure When creating the tutorial, my main focus was to create a stimulating learning environment that allows the learner to easily, independently and joyfully study historic and modern encryption systems. In order to accomplish this goal, the most important question to answer is how to design the learning environment to produce the best learning results? Therefore, a crucial question has to be answered: Which learning theory serves the stated goals best? In the above discussion, I argue that no single learning theory possesses universal functionality. Instead – using a pragmatic approach - based upon the described learning group, the learning objectives and the learner motivation, suiting learn theoretic principles as laid out in section 7.1.4 shall be used. As described before, in order to support self-driven autonomous learning that enables learners to solve ill-defined problems in complex authentic situations, constructivism provides my preferred learning model. Clearly, constructivist principles shall not be employed with novices of cryptography. Beginners will be frustrated when attempting to solve complex problems without a proper foundation. In general, behaviorist and cognitivist methods are more appropriate for beginners and intermediate learners to form a solid foundation. Cognitivist methods are used with the introduction of all historic ciphers in the sections titled “Challenge”, “Substitution Ciphers”, “Transposition Ciphers”, “The Goldbug” and “The Adventure of the Dancing Men”. As their unknown underlying mechanisms are not too complex, students are given the opportunity to discover these ciphers by themselves using the interactive encryption tools. Students can take their time to figure the 13 underlying mechanisms in a playful manner. No teacher pressure is involved, no risk of public embarrassment in case of failure, no grade pressure involved. A safe learning environment allows for placing the entire focus on the mechanisms of the cipher. This discovery based learning can be performed in cooperation with another learner or individually. Learners may also request hints from the teacher or other students. Explanations can be checked for correctness using the interactive encryption tools. As learners proceed from one substation cipher to the next via the head menu, new cryptographic information is compared to the existing learner’s cryptographic knowledge structure. Substitution ciphers are combined, extended or altered to create new substitution ciphers. For example, the Linear Cipher is a combination of the Caesar Cipher and the Multiplication Cipher. Here, cognitivist principles are used as existing rules are modified and applied to form new rules. Behaviorist methods are employed when ciphers were not successfully discovered by the learner. In that case, the following sections titled “How It Works” ask the learner to encode and decode in the explained manner. Answers can be verified using the encryption tools or the CTRL-A option. Immediate positive reinforcement shall strengthen the established stimulus response relationship and encourage the learner to continue with a positive attitude. Following the behaviorist ”law of exercise” with immediate feedback, the learner is asked to encode and decode a few times messages. According to Thorndike, the stimulus response bond becomes stronger with repetition and positive feedback. Both cognitivist and behaviorist methods are employed on the pages that lay the mathematical foundation of the encryption systems (these are the pages titled “Modular Arithmetic” through “Euler’s Theorem” that are part of the head menu column titled “Crypto Tools”). Here, students can – in a limited manner – discover mathematical principles such as modular arithmetic (referred to as “clock arithmetic”). However, mostly explanations are provided that students are to follow. Following the explanations, students are asked to perform mathematical computation based on the given rules. It would be practically impossible to discover advanced mathematical theorems such as the Euler’s Theorem or the Euclidean Algorithm. These mathematical discoveries were made by mathematicians with a vast mathematical background and are impossibly rediscovered by students with a beginning knowledge in this field. This general instructional dilemma occurs in many areas of mathematics where students are simply introduced to underlying theorems and have to digest them. Usually, behaviorist strategies follow this initial exposure with a list of computational exercises to practice the newly introduced. Cognitivist strategies are used in the sections titled “Master It”, “Decode It” and “Break It”. Here the ciphers are scrutinized, the underlying and previously established coding mechanism is the basis for the decoding and the crypto-analytic process. Existing coding rules are being manipulated. This is followed by behaviorist based decoding and cryptoanalytic exercises that can be verified using the interactive encryption tools and the CTRL-A option. 14 Developing a thorough understanding of any cryptographic method requires investigating the three main aspects of cryptography: encryption, decryption and crypto-analysis. In the tutorial, the learner explores these 3 categories consecutively as shown in table1 below. “Challenge” - permits students to discover the encryption and decryption method of the investigated cipher from encrypted sample texts. “How it works and Master” - develops and verifies students’ understanding of the encoding method of the cipher. “Decode It” - develops and verifies the students’ understanding of the decoding method of the cipher. “Break It” - develops and verifies the students’ proper understanding of how to cryptoanalyze the cipher. Table 1: The four tasks to investigate a cipher. Constructivist strategies are effective once the learner has the ability to acquire advanced knowledge of cryptographic methods. Then, the learner can freely start to investigate aspects of cryptography that are of particular interest to him. He can use the provided link for self-directed cryptographic studies such as the historic or the practical security aspects of cryptography. The provided web links give the starting point to such investigations. A simple, user-friendly navigation system facilitates the tutorial navigation. Motivation is the driving force of self-directed studies. The tutorial tries to stimulate intrinsic motivation as follows: Students are able to pursuit their preferred aspect of cryptography. I.e. historic, real-life applications or mathematical aspects can be pursued through the provided links to tutorial pages as well as to Internet pages. Real life situations are portrayed in the tutorial that show how even the learner uses and relies on cryptography. External motivation is provoked through the rewards that are given to cryptography experts that solve the provided Cipher Challenge. Other assumptions of constructivist learning are fulfilled as well: The learner can freely choose the aspect(s) to be investigated and has the freedom of how to pursuit it. The selected topics are naturally embedded in their social setting and are not prepared or simplified by the teacher. Learners are encouraged to work cooperatively. The provided exercises initiate desired communication among students to exchange, create and clarify ideas regarding the mechanisms of ciphers. Group efforts can be very productive and rewarding i.e. when crypto-analyzing ciphers and when designing new ciphers. Such hybrid learning environments in which communication and cooperation are effective study elements have proven to be more attractive to the learner. Kerres (2000) found that the acceptance of individualized learning systems as rather limited whereas project-oriented exercises that support cooperative learning are more attractive to the learner. 15 Learning is constructed through the free investigation of cryptographic rules. Learners add new knowledge to prior knowledge. Sequential Structure of Learning Environment The Cryptography tutorial is divided into seven sections that can be navigated through via the head menu located on top of each page. The first section (“Cryptography”) introduces basic concepts, terminology and applications of cryptography on 9 web pages. The next five sections (“Caesar Cipher”, “Multiplication Cipher”, “Linear Cipher”, “Polyalphabetic Ciphers” and “RSA Cipher”) are dedicated to the introduction of the mechanisms of such ciphers each using between 2 and 6 pages. The last section (“Crypto Tools”) is a reference section that is used throughout the study of the tutorial. It serves two purposes: it illuminates the underlying mathematical concepts of cryptography as well as provides necessary cryptography tools such as a crypto calculator and a letter frequency counter. The tutorial ends with the “Cipher Challenge” which is the ultimate test of the Cryptography Tutorial. It covers 8 of the most prominent ciphers which are investigated in the tutorial. The ability to cryptoanalyze all 8 ciphers requires profound knowledge of the learned ciphers. Students that already have a thorough knowledge of cryptography may choose to begin the tutorial with the Cipher Challenge. The Cipher Challenge contains hyperlinks that provide the learner with quick and easy access to all the necessary information concerning the ciphers. Although the purpose of the cipher challenge is ultimately to test the learner’s knowledge of the material, its successful completion is very rewarding. In the cryptography class, students that master the Cipher Challenge are encouraged to email the solution to me and are awarded an appropriate prize. The tutorial’s sequential design supports the natural learning process i.e. “from simple to difficult”. Through gradually learning more complex ciphers, the learner may confidently progress through the lessons. For example, to master the first basic ciphers the learner is solely required to have mastered addition and to know the chronology of the letters in the alphabet. With each cipher the learner learns a particular mathematical concept that is required to master the subsequent ciphers. The final cipher to study, the RSA Cipher, is a difficult cipher to comprehend and requires the knowledge of all mathematical concepts studied previously. Further Didactic Aspects of Learning Environment Immediate Feedback: A learner shall be able to keep track of his learning progress. This can be achieved through answering the posed questions and checking the answers using the highlighting function of the key combination CTRL-A which displays the hidden answers right next to the question. The Cipher Challenge was created as stimulation for users that like to challenge themselves by taking on the job of a cryptoanalyst. Here, the user is referred to the 16 relevant sections of the tutorial for assistance. Final solutions to the challenge may be emailed to me resulting in immediate feedback. Navigation System: I designed a menu driven tutorial. The head menu gives the user an immediate overview of the full extent of the tutorial. Sequential tutorial navigation is made simple: from left to right, top to bottom. Any page can be accessed at any time allowing for quick look ups, references, reviews, etc. “Back”, “Next” and “Home” links are provided on the top and “Back” and “Next” buttons at the bottom of every page enabling quick access to neighboring pages and to the starting page. The provided links to pertinent pages are usually provided in the right column of each page. Different tutorial pages contain different links with some links used more than once. I decided to leave the link column on each page unchanged. A central link page which contains the links of all other tutorial’s web pages appears to be useful. It would have eliminated the right columns on each page. However, I decided not to create this page as a user is now two as opposed to one mouse click away from reading the desired pertinent information. This does not seem to be a significant factor when accessing a few outside websites only. However, significantly more time is needed when a great number of outside web sites are visited. I also find that the right column is not very wide and does not take away a significant amount of space from the remaining page. However, it does provide the links where they seem most pertinent. Page Length: It was my intention to keep the page length as small as possible. This goal was realized on most pages of the learning environment. However, the pages that contain a lot of text are pages that are usually used as reference pages or contain detailed encryption explanations that the user may skip without a loss of the overall picture. Additionally, pages that contain a lot of text often contain links to other pages or interactive encryption tools that allow the user to verify the written information and by doing so continues the interactive format and reduces any monotony. 7.3.4 Learning Organization The two-week long cryptography course took place at the end of the school year 20022003. The 26 students took their nationwide Advanced Placement Math exams. Teacher and students met for 50 minutes five times a week. In the first class, the students are introduced to the structure of the tutorial and its usage. The teacher acts as a facilitator who answers questions, assists in Internet research or any other needed area. The teacher was accessible inside and outside the classroom and via email. The tutorial is hosted on the school’s Internet server. During class periods, students accessed the tutorial from their workstation in the school’s library. However, students also accessed the tutorial from home. The Internet-accessible tutorial enabled students to utilize the tutorial outside of their regular class period and, thus, is a preferable solution to a tutorial that is exclusively accessible through the school’s network. The ability to access the tutorial outside of class should not be underestimated as it enables the students to review lessons at home or to engage in self-directed research. 17 Literature Anderson, J.R. (1988). Kognitive Psychologie – Eine Einfuehrung. Heidelberg: Spektrum der Wissenschaft. Dewey, J. (1897). My Pedagogic Creed. School Journal vol. 54. Available online at: http://www.pragmatism.org/genealogy/dewey/My_pedagogic_creed.htm Ertmer, P. A., Newby, T. J. (1993). Behaviorism, cognitivism, constructivism: Comparing critical features from an instructional design perspective. Performance Improvement Quarterly, 6 (4), 50-70. Good, T. L., Brophy, J. E. (1990). Educational psychology: A realistic approach. (4th ed.).White Plains, NY: Longman Kerres, M. (1999). Didaktische Konzeption multimedialer und telemedialer Lernumgebungen. In: HMD – Praxis der Wirtschaftsinformatik. Available at: http://www.educanet.ch/group/dm0121/kerresdk.pdf Kerres, M. (2000). “Mediendidaktische Analyse digitaler Medien im Unterricht.” In Computer und Unterricht: 10 (1). Available at: http://www.edumedia.uniduisburg.de/articles/CuU-kerres1-endf.pdf Kerres, M.; de Witt, C. (2002). Quo Vadis Mediendidaktik? Zur theoretscien Fundierung von Mediendidaktik. In: MedienPaedagogik 2002. Available at: http://www.edumedia.uni-duisburg.de/publications/kerres_dewitt1.pdf Mergel B. (1998). Instructional Design and Learning Theory. Available at: http://www.usask.ca/education/coursework/802papers/mergel/brenda.htm Merrill, M. D. (1991). Constructivism and instructional design. Educational Technology, May, 45-53. Schuman, L. (1996). Perspectives on instruction. [On-line]. http://edweb.sdsu.edu/courses/edtec540/Perspectives/Perspectives.html Available: Schwier, R. A. (1995). Issues in emerging interactive technologies. In G.J. Anglin (Ed.), Instructional technology: Past, present and future. (2nd ed., pp. 119-127)., Englewood, CO: Libraries Unlimited, Inc. Yang, Y. C. (2001). Learning Theories - Synthesis and Comparison. [On-line]. Available at: http://expert.cc.purdue.edu/~yangyc/index/theory.html 18