{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T19:47:47Z","timestamp":1769284067830,"version":"3.49.0"},"reference-count":25,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2014,3,1]],"date-time":"2014-03-01T00:00:00Z","timestamp":1393632000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000172","name":"Division of Undergraduate Education","doi-asserted-by":"publisher","award":["08-546 DUE-0837656"],"award-info":[{"award-number":["08-546 DUE-0837656"]}],"id":[{"id":"10.13039\/100000172","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Comput. Educ."],"published-print":{"date-parts":[[2014,3]]},"abstract":"<jats:p>With the continuous growth of cyberinfrastructure throughout modern society, the need for secure computing and communication is more important than ever before. As a result, there is also an increasing need for entry-level developers who are capable of designing and building practical solutions for systems with stringent security requirements. This calls for careful attention to algorithm choice and implementation method, as well as trade-offs between hardware and software implementations. This article describes motivation and efforts taken by three departments at Rochester Institute of Technology (Computer Engineering, Computer Science, and Software Engineering) that were focused on creating a multidisciplinary course that integrates the algorithmic, engineering, and practical aspects of security as exemplified by applied cryptography. In particular, the article presents the structure of this new course, topics covered, lab tools and results from the first two spring quarter offerings in 2011 and 2012.<\/jats:p>","DOI":"10.1145\/2538029","type":"journal-article","created":{"date-parts":[[2014,4,1]],"date-time":"2014-04-01T13:06:54Z","timestamp":1396357614000},"page":"1-20","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Cybersecurity Education"],"prefix":"10.1145","volume":"14","author":[{"given":"Marcin","family":"Lukowiak","sequence":"first","affiliation":[{"name":"Rochester Institute of Technology"}]},{"given":"Stanis\u0142aw","family":"Radziszowski","sequence":"additional","affiliation":[{"name":"Rochester Institute of Technology"}]},{"given":"James","family":"Vallino","sequence":"additional","affiliation":[{"name":"Rochester Institute of Technology"}]},{"given":"Christopher","family":"Wood","sequence":"additional","affiliation":[{"name":"Rochester Institute of Technology"}]}],"member":"320","published-online":{"date-parts":[[2014,3]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Bertoni G. Daemen J. Peeters M. and Assche G. V. 2009. Keccak specifications.  Bertoni G. Daemen J. Peeters M. and Assche G. V. 2009. Keccak specifications."},{"key":"e_1_2_1_2_1","volume-title":"Proceedings of the Cryptographic Hardware and Embedded Systems (CHES). 319--333","author":"Chodowiec P.","unstructured":"Chodowiec , P. and Gaj , K . 2003. Very compact FPGA implementation of the AES algorithm . In Proceedings of the Cryptographic Hardware and Embedded Systems (CHES). 319--333 . Chodowiec, P. and Gaj, K. 2003. Very compact FPGA implementation of the AES algorithm. In Proceedings of the Cryptographic Hardware and Embedded Systems (CHES). 319--333."},{"key":"e_1_2_1_3_1","unstructured":"Daemen J. and Rijmen V. 1999. AES Proposal: Rijndael.  Daemen J. and Rijmen V. 1999. AES Proposal: Rijndael."},{"key":"e_1_2_1_4_1","first-page":"1","article-title":"Teaching application implementation on FPGAs to computer science and software engineering students","volume":"18","author":"Dandass Y.","year":"2008","unstructured":"Dandass , Y. 2008 . Teaching application implementation on FPGAs to computer science and software engineering students . Comput. Educ. J. 18 , 1 . Dandass, Y. 2008. Teaching application implementation on FPGAs to computer science and software engineering students. Comput. Educ. J. 18, 1.","journal-title":"Comput. Educ. J."},{"key":"e_1_2_1_5_1","volume-title":"Recommendation for block cipher modes of operation: Methods and techniques. Tech. rep","author":"Dworkin M.","unstructured":"Dworkin , M. 2001. SP 800-38A 2001 Edition . Recommendation for block cipher modes of operation: Methods and techniques. Tech. rep ., NIST , Gaithersburg, MD . Dworkin, M. 2001. SP 800-38A 2001 Edition. Recommendation for block cipher modes of operation: Methods and techniques. Tech. rep., NIST, Gaithersburg, MD."},{"key":"e_1_2_1_6_1","volume-title":"Recommendation for block cipher modes of operation: The CCM mode for authentication and confidentiality","author":"Dworkin M.","unstructured":"Dworkin , M. 2004. SP 800-38C. Recommendation for block cipher modes of operation: The CCM mode for authentication and confidentiality . NIST , Gaithersburg, MD . Dworkin, M. 2004. SP 800-38C. Recommendation for block cipher modes of operation: The CCM mode for authentication and confidentiality. NIST, Gaithersburg, MD."},{"key":"e_1_2_1_7_1","volume-title":"Recommendation for block cipher modes of operation: The CMAC mode for authentication","author":"Dworkin M.","unstructured":"Dworkin , M. 2005. SP 800-38B. Recommendation for block cipher modes of operation: The CMAC mode for authentication . NIST , Gaithersburg, MD . Dworkin, M. 2005. SP 800-38B. Recommendation for block cipher modes of operation: The CMAC mode for authentication. NIST, Gaithersburg, MD."},{"key":"e_1_2_1_8_1","volume-title":"Recommendation for block cipher modes of operation: Galois\/Counter Mode (GCM) and GMAC","author":"Dworkin M.","unstructured":"Dworkin , M. 2007. SP 800-38D. Recommendation for block cipher modes of operation: Galois\/Counter Mode (GCM) and GMAC . NIST , Gaithersburg, MD . Dworkin, M. 2007. SP 800-38D. Recommendation for block cipher modes of operation: Galois\/Counter Mode (GCM) and GMAC. NIST, Gaithersburg, MD."},{"key":"e_1_2_1_9_1","volume-title":"Recommendation for block cipher modes of operation, cipher modes of operation: Three variants of ciphertext stealing for CBC mode","author":"Dworkin M.","unstructured":"Dworkin , M. 2010a. Recommendation for block cipher modes of operation, cipher modes of operation: Three variants of ciphertext stealing for CBC mode . NIST , Gaithersburg, MD . Dworkin, M. 2010a. Recommendation for block cipher modes of operation, cipher modes of operation: Three variants of ciphertext stealing for CBC mode. NIST, Gaithersburg, MD."},{"key":"e_1_2_1_10_1","volume-title":"Recommendation for block cipher modes of operation: The XTS-AES mode for confidentiality on storage devices","author":"Dworkin M.","unstructured":"Dworkin , M. 2010b. SP 800-38E. Recommendation for block cipher modes of operation: The XTS-AES mode for confidentiality on storage devices . NIST , Gaithersburg, MD . Dworkin, M. 2010b. SP 800-38E. Recommendation for block cipher modes of operation: The XTS-AES mode for confidentiality on storage devices. NIST, Gaithersburg, MD."},{"key":"e_1_2_1_11_1","volume-title":"Proceedings of IEEE 32nd Annual Frontiers in Education (FIE).","author":"Hadim H.","unstructured":"Hadim , H. and Esche , S . 2002. Enhancing the engineering curriculum through project-based learning . In Proceedings of IEEE 32nd Annual Frontiers in Education (FIE). Hadim, H. and Esche, S. 2002. Enhancing the engineering curriculum through project-based learning. In Proceedings of IEEE 32nd Annual Frontiers in Education (FIE)."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1119\/1.18809"},{"key":"e_1_2_1_13_1","first-page":"212","article-title":"Announcing request for candidate algorithm nominations for a new cryptographic hash algorithm (SHA-3) family","volume":"72","author":"Kayser R.","year":"2007","unstructured":"Kayser , R. 2007 . Announcing request for candidate algorithm nominations for a new cryptographic hash algorithm (SHA-3) family . Federal Register 72 , 212 . Kayser, R. 2007. Announcing request for candidate algorithm nominations for a new cryptographic hash algorithm (SHA-3) family. Federal Register 72, 212.","journal-title":"Federal Register"},{"key":"e_1_2_1_14_1","volume-title":"Proceedings of the ASEE Annual Conference. American Society of Engineering Education.","author":"Lukowiak M.","unstructured":"Lukowiak , M. , Meneely , A. , Radziszowski , S. , Wood , C. , and Vallino , J . 2012. Developing an applied, security-oriented computing curriculum . In Proceedings of the ASEE Annual Conference. American Society of Engineering Education. Lukowiak, M., Meneely, A., Radziszowski, S., Wood, C., and Vallino, J. 2012. Developing an applied, security-oriented computing curriculum. In Proceedings of the ASEE Annual Conference. American Society of Engineering Education."},{"key":"e_1_2_1_15_1","unstructured":"National Institute of Standards and Technology. Cryptographic Hash project website Computer Security Division.  National Institute of Standards and Technology. Cryptographic Hash project website Computer Security Division."},{"key":"e_1_2_1_16_1","unstructured":"National Institute of Standards and Technology. 2001. Specification for the Advanced Encryption Standard (AES). Federal Information Processing Standards Publication 197.  National Institute of Standards and Technology. 2001. Specification for the Advanced Encryption Standard (AES). Federal Information Processing Standards Publication 197."},{"key":"e_1_2_1_17_1","unstructured":"National Institute of Standards and Technology 2012. NIST selects winner of secure hash algorithm (SHA-3) competition. http:\/\/www.nist.gov\/itl\/csd\/sha-100212.cfm.  National Institute of Standards and Technology 2012. NIST selects winner of secure hash algorithm (SHA-3) competition. http:\/\/www.nist.gov\/itl\/csd\/sha-100212.cfm."},{"key":"e_1_2_1_18_1","unstructured":"Pellerin D. and Thibault S. 2005. Practical FPGA Programming in C. Prentice Hall.   Pellerin D. and Thibault S. 2005. Practical FPGA Programming in C . Prentice Hall."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.2168-9830.2004.tb00809.x"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSE.2007.13"},{"key":"e_1_2_1_21_1","volume-title":"Cryptography: Theory and Practice","author":"Stinson D.","year":"2006","unstructured":"Stinson , D. 2006 . Cryptography: Theory and Practice 3 rd Ed. CRC Press . Stinson, D. 2006. Cryptography: Theory and Practice 3rd Ed. CRC Press.","edition":"3"},{"key":"e_1_2_1_22_1","volume-title":"Proceedings of the 35th Annual Conference Frontiers in Education (FIE) Conference. FT3G--12","author":"Vallino J.","unstructured":"Vallino , J. and Czernikowski , R . 2005. Thinking inside the box: A multi-disciplinary real-time and embedded systems course sequence . In Proceedings of the 35th Annual Conference Frontiers in Education (FIE) Conference. FT3G--12 . Vallino, J. and Czernikowski, R. 2005. Thinking inside the box: A multi-disciplinary real-time and embedded systems course sequence. In Proceedings of the 35th Annual Conference Frontiers in Education (FIE) Conference. FT3G--12."},{"key":"e_1_2_1_23_1","volume-title":"Proceedings of the Workshop on Embedded Systems Education.","author":"Vallino J.","unstructured":"Vallino , J. and Czernikowski , R . 2008. Interdisciplinary teaming as an effective method to teach real-time and embedded systems courses . In Proceedings of the Workshop on Embedded Systems Education. Vallino, J. and Czernikowski, R. 2008. Interdisciplinary teaming as an effective method to teach real-time and embedded systems courses. In Proceedings of the Workshop on Embedded Systems Education."},{"key":"e_1_2_1_24_1","unstructured":"Virginia Tech. Secure Hardware Design. ECE 5520.  Virginia Tech. Secure Hardware Design. ECE 5520."},{"key":"e_1_2_1_25_1","unstructured":"Worcester Polytechnic Institute. Advanced Cryptography. ECE 673.  Worcester Polytechnic Institute. Advanced Cryptography. ECE 673."}],"container-title":["ACM Transactions on Computing Education"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2538029","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2538029","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:18:14Z","timestamp":1750234694000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2538029"}},"subtitle":["Bridging the Gap Between Hardware and Software Domains"],"short-title":[],"issued":{"date-parts":[[2014,3]]},"references-count":25,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,3]]}},"alternative-id":["10.1145\/2538029"],"URL":"https:\/\/doi.org\/10.1145\/2538029","relation":{},"ISSN":["1946-6226"],"issn-type":[{"value":"1946-6226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,3]]},"assertion":[{"value":"2012-12-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2013-10-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2014-03-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}