{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:52:19Z","timestamp":1750308739651,"version":"3.41.0"},"reference-count":14,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2010,1,18]],"date-time":"2010-01-18T00:00:00Z","timestamp":1263772800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGCSE Bull."],"published-print":{"date-parts":[[2010,1,18]]},"abstract":"<jats:p>This case study discusses the incorporation of encryption systems development into the educational journey of undergraduate computer science or game development majors. We discuss the experience of first semester Daniel Webster College sophomores who attempted to develop the German WWII ENIGMA encryption system in assembly language. By incorporating a real world encryption system project into a beginning computer architecture class students become deeply immersed in numbering systems, hardware logic design, operating system services and, of course instruction set architectures. Of necessity, they also must refine and develop their programming skills to an extraordinary degree. During the past seven years we have found that most students can develop a complete software version of the complex and amazing ENIGMA encryption system. We outline in this paper the strategy that seems to lead to a successful outcome for most students.<\/jats:p>","DOI":"10.1145\/1709424.1709442","type":"journal-article","created":{"date-parts":[[2010,1,26]],"date-time":"2010-01-26T14:01:38Z","timestamp":1264514498000},"page":"40-44","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["An encryption system in assembly language"],"prefix":"10.1145","volume":"41","author":[{"given":"Tom","family":"Goulding","sequence":"first","affiliation":[{"name":"Wentworth Institute of Technology, Boston, Massachusetts"}]}],"member":"320","published-online":{"date-parts":[[2010,1,18]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Bletchley Park National Codes Center http:\/\/www.bletchleypark.org.uk\/  Bletchley Park National Codes Center http:\/\/www.bletchleypark.org.uk\/"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1473195.1473223"},{"volume-title":"2th International Multi-Conference on Society, Cybernetics and Informatics Proceedings","year":"2008","author":"Goulding T.","key":"e_1_2_1_3_1"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1345375.1345423"},{"volume-title":"R. Complex Game Development: A Case Study in Rapid Software Development By Novice Programmers. IASTED: SEA07 Conference Proceedings. MIT Cambridge, MA","year":"2007","author":"Goulding T.","key":"e_1_2_1_5_1"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1113847.1113877"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1086\/588767"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00133895"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1080\/0260293032000158162"},{"key":"e_1_2_1_10_1","first-page":"181","author":"Holubec E.","year":"1992","journal-title":"Spring"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1080\/00029890.1977.11994333"},{"issue":"2","key":"e_1_2_1_12_1","first-page":"42","volume":"28","author":"Long C.","year":"2007","journal-title":"NEA Today"},{"key":"e_1_2_1_13_1","unstructured":"Patt Y & Patel S Introduction to Computing Architecture 2nd ed. McGraw Hill 2008.  Patt Y & Patel S Introduction to Computing Architecture 2nd ed. McGraw Hill 2008."},{"key":"e_1_2_1_14_1","unstructured":"Spiess F. Enigma Flash Retrieved July 29 2009 from http:\/\/enigmaco.de\/_fs\/index-enigma.html  Spiess F. Enigma Flash Retrieved July 29 2009 from http:\/\/enigmaco.de\/_fs\/index-enigma.html"}],"container-title":["ACM SIGCSE Bulletin"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1709424.1709442","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1709424.1709442","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:22:09Z","timestamp":1750278129000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1709424.1709442"}},"subtitle":["a game-like project for novice programmers"],"short-title":[],"issued":{"date-parts":[[2010,1,18]]},"references-count":14,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2010,1,18]]}},"alternative-id":["10.1145\/1709424.1709442"],"URL":"https:\/\/doi.org\/10.1145\/1709424.1709442","relation":{},"ISSN":["0097-8418"],"issn-type":[{"type":"print","value":"0097-8418"}],"subject":[],"published":{"date-parts":[[2010,1,18]]},"assertion":[{"value":"2010-01-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}