Wednesday, January 29, 2020
To His Coy Mistress Essay The poem is a deductive poem written by a much older person to the little mistress. The 46 line poem can be said to be divided into three different parts where the author tries to make a point. The first part, lines 1- 20, introduces the limitation of time in for the poet to sing of the mistressesÃ¢â¬â¢ beauty and shyness. This is seen in line 1 where the poet says Ã¢â¬Å"Had we enough timeÃ¢â¬ and Ã¢â¬Å"Ã¢â¬ ¦an hundred years should go to praiseÃ¢â¬ ¦Thine eyes, and on thy forehead gazeÃ¢â¬ . Generally, the poem is an argument that follows procession of the poetÃ¢â¬â¢s thought. In the second part of the poem, lines 21-32, poet says that with the poet arguing that time is indeed short and unfavorable to lovers as they can not enjoy their love for long as Ã¢â¬Å"Ã¢â¬ ¦time is wingedÃ¢â¬ Ã¢â¬Å"Ã¢â¬ ¦And you quaint honor turn to dust, And into ashes all my lustÃ¢â¬ . In the third part, lines 33-46, the poet draws a conclusion that due to the fact that life is short and time unlimited, they should throw away any care and tear their pleasure with rough strife. The tone of the poet used a flirty and seductive tone in conveying his message to his beloved mistress. The setting of the poem is in medieval times when it was socially unacceptable for ladies to express their desire for a man even though they are in love with him. They are to show some Ã¢â¬Å"coynessÃ¢â¬ at first so feign indifference to the romantic advances of men. He used seductive words like Ã¢â¬Å"Ã¢â¬ ¦two hundred to adore each breastÃ¢â¬ (line 15), Ã¢â¬Å"Ã¢â¬ ¦and your quaint honor turns to dustÃ¢â¬ ¦ and into ashes all my lustÃ¢â¬ (lines 29 and 30). The poet uses rhyme scheme that follows the aa, bb, cc pattern. He also uses metaphorical expression in the poem. This can be seen in lines 11, 22, 35 and 36. In addition to this, the poet used imagery as a tool in the poem. This can be seen in lines 6, 12, 16, 24, 27, 29, 30, 36, 38, 39. He also used simile in lines 34 Ã¢â¬Å"Ã¢â¬ ¦like morning dewÃ¢â¬ , and lines 38 Ã¢â¬Å"Ã¢â¬ ¦like amorous birds of preyÃ¢â¬ . He also used allusion in line 11 where he said Ã¢â¬Å"Ã¢â¬ ¦vegetable loveÃ¢â¬ .
Tuesday, January 21, 2020
I wasnÃ¢â¬â¢t expecting it, I just looked up and there it was: the disgusting, bloody, mauled body of a dead soldier. The shot was brief and I do not remember if he was strung up on a tree, if he was hanging, or what not. I was not in class the day prior due to a sleepless night led to sickness, so I was not able to watch the first part of the movie. I remembered that our class was supposed to watch a war movie; Ms. Klein was deciding between Ã¢â¬Å"Born on the Fourth of JulyÃ¢â¬ and Ã¢â¬Å"PlatoonÃ¢â¬ . I vaguely remember her saying something about one of the movies being a slight bit, well, gruesomely horrifying. Due to a number of things that were due in my classes that day, when I walked into my English room, I was not thinking about the warnings that I was given. Then I looked up. Shocked I guess you could say was my first reaction. I was a little too surprised to be disgusted. DonÃ¢â¬â¢t sound so disappointed, I became sick to my stomach all too soon. It was hard for me to concentrate on a lot of Ã¢â¬Å"PlatoonÃ¢â¬ during the first day of class. I looked at the screen only half of the time; I buried my head in current work so as to hide my eyes from the disasters on TV. I would occasionally look up and sure enough, each time I proceeded to lift my head, I squealed, and put it back down. I remember scenes of teenage boys being tortures with bullets, old women and men being killed, girls being raped, and children being put in front of a firing squad. That night, I couldnÃ¢â¬â¢t control the terrible scenes that flooded my head as I tried to sleep. The next day, I had learned to deal with the violence a little more than the previous day. I watched almost all of it, having to turn away only occasionally. The emotions that the violence expressed held me taut; it no longer turned me away from the screen, but drew me in, showing me further the horrible nature of war. Even though director Oliver Stone may have exaggerated situations in the war, he presented Vietnam like no one before. War is not shown as an event worthy of glory or praise, we are no longer shown as a brave force of victims. Review Of Platoon :: essays research papers I wasnÃ¢â¬â¢t expecting it, I just looked up and there it was: the disgusting, bloody, mauled body of a dead soldier. The shot was brief and I do not remember if he was strung up on a tree, if he was hanging, or what not. I was not in class the day prior due to a sleepless night led to sickness, so I was not able to watch the first part of the movie. I remembered that our class was supposed to watch a war movie; Ms. Klein was deciding between Ã¢â¬Å"Born on the Fourth of JulyÃ¢â¬ and Ã¢â¬Å"PlatoonÃ¢â¬ . I vaguely remember her saying something about one of the movies being a slight bit, well, gruesomely horrifying. Due to a number of things that were due in my classes that day, when I walked into my English room, I was not thinking about the warnings that I was given. Then I looked up. Shocked I guess you could say was my first reaction. I was a little too surprised to be disgusted. DonÃ¢â¬â¢t sound so disappointed, I became sick to my stomach all too soon. It was hard for me to concentrate on a lot of Ã¢â¬Å"PlatoonÃ¢â¬ during the first day of class. I looked at the screen only half of the time; I buried my head in current work so as to hide my eyes from the disasters on TV. I would occasionally look up and sure enough, each time I proceeded to lift my head, I squealed, and put it back down. I remember scenes of teenage boys being tortures with bullets, old women and men being killed, girls being raped, and children being put in front of a firing squad. That night, I couldnÃ¢â¬â¢t control the terrible scenes that flooded my head as I tried to sleep. The next day, I had learned to deal with the violence a little more than the previous day. I watched almost all of it, having to turn away only occasionally. The emotions that the violence expressed held me taut; it no longer turned me away from the screen, but drew me in, showing me further the horrible nature of war. Even though director Oliver Stone may have exaggerated situations in the war, he presented Vietnam like no one before. War is not shown as an event worthy of glory or praise, we are no longer shown as a brave force of victims.
Monday, January 13, 2020
William Stallings Copyright 2006 Supplement to Cryptography and Network Security, Fourth Edition Prentice Hall 2006 ISBN: 0-13-187316-4 http://williamstallings. com/Crypto/Crypto4e. html 8/5/05 Simplified DES, developed by Professor Edward Schaefer of Santa Clara University [SCHA96], is an educational rather than a secure encryption algorithm. It has similar properties and structure to DES with much smaller parameters. The reader might find it useful to work through an example by and while following the discussion in this Appendix. C. 1 Overview Figure C. 1 illustrates the overall structure of the simplified DES, which we will refer to as SDES. The S-DES encryption algorithm takes an 8-bit block of plaintext (example: 10111101) and a 10-bit key as input and produces an 8-bit block of ciphertext as output. The S-DES decryption algorithm takes an 8-bit block of ciphertext and the same 10-bit key used to produce that ciphertext as input and produces the original 8-bit block of plaintext .The encryption algorithm involves five functions: an initial permutation (IP); a complex function labeled fK, which involves both permutation and substitution operations and depends on a key input; a simple permutation function that switches (SW) the two halves of the data; the function fK again; and finally a permutation function that is the inverse of the initial permutation (IPÃ¢â¬â1). As was mentioned in Chapter 2, the use of multiple stages of permutation and substitution results in a more complex algorithm, which increases the difficulty of cryptanalysis.The function fK takes as input not only the data passing through the encryption algorithm, but also an 8-bit key. The algorithm could have been designed to work with a 16-bit key, consisting of two 8-bit subkeys, one used for each occurrence of fK. Alternatively, a single 8-bit key could have been used, with the same key used twice in the algorithm. A compromise is to use a 10-bit key from which two 8-bit subkeys are gener ated, as depicted in Figure C. 1. In this case, the key is first subjected to a permutation (P10). Then a shift operation is performed.The output of the shift operation then passes through a permutation function that produces an 8-bit output (P8) for the first subkey (K1 ). The output of the shift operation also feeds into another shift and another instance of P8 to produce the second subkey (K 2 ). We can concisely express the encryption algorithm as a composition1 of functions: which can also be written as: IP-1 o fK2 o SW o fK1 o IP ((( ciphertext = IP-1 fK 2 SW fK1 (IP(plaintext )) where ( K1 = P8 Shift (P10(key )) ! ( ( ))) ) K2 = P8 Shift Shift( P10( key)) )) Decryption is also shown in Figure C. and is essentially the reverse of encryption: ((( plaintext = IP-1 fK1 SW fK 2 (IP(ciphertext )) 1 ))) Definition:! f f and g are two functions, then the function F with the equation y = F(x) = I g[f(x)] is called the composition of f and g and is denoted as F = g o f . C-2 8/5/05 We now examine the elements of S-DES in more detail. C. 2 S-DES Key Generation S-DES depends on the use of a 10-bit key shared between sender and receiver. From this key, two 8-bit subkeys are produced for use in particular stages of the encryption and decryption algorithm. Figure C. 2 depicts the stages followed to produce the subkeys.First, permute the key in the following fashion. Let the 10-bit key be designated as (k1 , k2 , k3 , k4 , k5 , k6 , k7 , k8 , k9 , k10). Then the permutation P10 is defined as: P10(k1 , k2 , k3 , k4 , k5 , k6 , k7 , k8 , k9 , k10) = (k3 , k5 , k2 , k7 , k4 , k10, k1 , k9 , k8 , k6 ) P10 can be concisely defined by the display: 3 5 2 7 P10 4 10 1 9 8 6 This table is read from left to right; each position in the table gives the identity of the input bit that produces the output bit in that position. So the first output bit is bit 3 of the input; the second output bit is bit 5 of the input, and so on.For example, the key (1010000010) is permuted to (1000001 100). Next, perform a circular left shift (LS-1), or rotation, separately on the first five bits and the second five bits. In our example, the result is (00001 11000). Next we apply P8, which picks out and permutes 8 of the 10 bits according to the following rule: P8 6 3 7 4 8 5 10 9 The result is subkey 1 (K1 ). In our example, this yields (10100100) We then go back to the pair of 5-bit strings produced by the two LS-1 functions and perform a circular left shift of 2 bit positions on each string. In our example, the value (00001 11000) becomes (00100 00011).Finally, P8 is applied again to produce K2 . In our example, the result is (01000011). C. 3 S-DES Encryption Figure C. 3 shows the S-DES encryption algorithm in greater detail. As was mentioned, encryption involves the sequential application of five functions. We examine each of these. Initial and Final Permutations The input to the algorithm is an 8-bit block of plaintext, which we first permute using the IP function: IP 2 6 3 1 4 8 5 7 This retains all 8 bits of the plaintext but mixes them up. At the end of the algorithm, the inverse permutation is used: C-3 8/5/05 1 3 IPÃ¢â¬â1 57 2 8 6 It is easy to show by example that the second permutation is indeed the reverse of the first; that is, IPÃ¢â¬â1(IP(X)) = X. The Function fK The most complex component of S-DES is the function fK, which consists of a combination of permutation and substitution functions.The functions can be expressed as follows. Let L and R be the leftmost 4 bits and rightmost 4 bits of the 8-bit input to fK, and let F be a mapping (not necessarily one to one) from 4-bit strings to 4-bit strings. Then we let fK(L, R) = (L ! F(R, SK), R) where SK is a subkey and ! s the bit-by-bit exclusive-OR function. For example, suppose the output of the IP stage in Figure C. 3 is (10111101) and F(1101, SK) = (1110) for some key SK. Then fK(10111101) = (01011101) because (1011) ! (1110) = (0101). We now describe the mapping F. The input is a 4-bi t number (n 1 n2 n3 n4 ). The first operation is an expansion/permutation operation: 4 1 2 E/P 32 3 4 1 For what follows, it is clearer to depict the result in this fashion: n4 n2 n1 n3 n2 n4 n3 n1 The 8-bit subkey K1 = (k11, k12, k13, k14, k15, k16, k17, k18) is added to this value using exclusiveOR: n4 ! 11 n2 ! k15 n1 ! k12 n3 ! k16 n2 ! k13 n4 ! k17 n3 ! k14 n1 ! k18 p0,1 p1,1 p0,2 p1,2 p0,3 p1,3 Let us rename these 8 bits: p0,0 p1,0 The first 4 bits (first row of the preceding matrix) are fed into the S-box S0 to produce a 2bit output, and the remaining 4 bits (second row) are fed into S1 to produce another 2-bit output. These two boxes are defined as follows: C-4 8/5/05 0 S0 = 1 2 3 0 Ã¢â¬Å"1 $3 $0 $3 # 1 0 2 2 1 2 3 1 1 3 3 2% 0Ã¢â¬ ² 3Ã¢â¬ ² 2Ã¢â¬ ² ; 0 S1 = 1 2 3 0 Ã¢â¬Å"0 $2 $3 $2 # 1 1 0 0 1 23 2 3% 1 3Ã¢â¬ ² 1 0Ã¢â¬ ² 0 3Ã¢â¬ ² & The S-boxes operate as follows.The first and fourth input bits are treated as a 2-bit number that specify a row of the S-box, and the s econd and third input bits specify a column of the Sbox. The entry in that row and column, in base 2, is the 2-bit output. For example, if (p0,0p0,3) = ! (00) and (p0,1p0,2) = (10), then the output is from row 0, column 2 of S0, which is 3, or (11) in binary. Similarly, (p1,0p1,3) and (p1,1p1,2) are used to index into a row and column of S1 to produce an additional 2 bits. Next, the 4 bits produced by S0 and S1 undergo a further permutation as follows: P4 2 4 3 1 The output of P4 is the output of the function F.The Switch Function The function fK only alters the leftmost 4 bits of the input. The switch function (SW) interchanges the left and right 4 bits so that the second instance of f K operates on a different 4 bits. In this second instance, the E/P, S0, S1, and P4 functions are the same. The key input is K2 . C. 4 Analysis of Simplified DES A brute-force attack on simplified DES is certainly feasible. With a 10-bit key, there are only 2 10 = 1024 possibilities. Given a ciphertex t, an attacker can try each possibility and analyze the result to determine if it is reasonable plaintext. What about cryptanalysis?Let us consider a known plaintext attack in which a single plaintext (p1 , p2 , p3 , p4 , p5 , p6 , p7 , p8 ) and its ciphertext output (c1 , c2 , c3 , c4 , c5 , c6 , c7 , c8 ) are known and the key (k1 , k2 , k3 , k4 , k5 , k6 , k7 , k8 , k9 , k10) is unknown. Then each ci is a polynomial function gi of the pj Ã¢â¬Ës and kj Ã¢â¬Ës. We can therefore express the encryption algorithm as 8 nonlinear equations in 10 unknowns. There are a number of possible solutions, but each of these could be calculated and then analyzed. Each of the permutations and additions in the algorithm is a linear mapping.The nonlinearity comes from the S-boxes. It is useful to write down the equations for these boxes. For clarity, rename (p0,0, p0,1,p0,2, p0,3) = (a, b, c, d) and (p1,0, p1,1,p1,2, p1,3) = (w, x, y, z), and let the 4-bit output be (q, r , s, t) Then the operati on of the S0 is defined by the following equations: q = abcd + ab + ac + b + d r = abcd + abd + ab + ac + ad + a + c + 1 where all additions are modulo 2. Similar equations define S1. Alternating linear maps with these nonlinear maps results in very complex polynomial expressions for the ciphertext bits, making cryptanalysis difficult.To visualize the scale of the problem, note that a polynomial equation in 10 unknowns in binary arithmetic can have 210 possible terms. On average, we might therefore C-5 8/5/05 expect each of the 8 equations to have 29 terms. The interested reader might try to find these equations with a symbolic processor. Either the reader or the software will give up before much progress is made. C. 5 Relationship to DES DES operates on 64-bit blocks of input. The encryption scheme can be defined as: IP-1 o fK16 o SW o fK15 o SW oL o SW o f K1 o IPA 56-bit key is used, from which sixteen 48-bit subkeys are calculated. There is an initial permutation of 64 bits foll owed by a sequence of shifts and permutations of 48 bits. Within the encryption algorithm, instead of F acting on 4 bits (n1 n2 n3 n4 ), it acts on 32 bits (n1 Ã¢â¬ ¦n32). After the initial expansion/permutation, the output of 48 bits can be diagrammed as: n32 n4 Ã¢â¬ ¢ Ã¢â¬ ¢ Ã¢â¬ ¢ n28 n1 n5 n29 n2 n6 Ã¢â¬ ¢ Ã¢â¬ ¢ Ã¢â¬ ¢ n30 n3 n7 n4 n8 n31 n32 n5 n9 Ã¢â¬ ¢ Ã¢â¬ ¢ Ã¢â¬ ¢ n1 This matrix is added (exclusive-OR) to a 48-bit subkey. There are 8 rows, corresponding to 8 S-boxes. Each S-box has 4 rows and 16 columns.The first and last bit of a row of the preceding matrix picks out a row of an S-box, and the middle 4 bits pick out a column. C-6 10-bit key ENCRYPTION DECRYPTION P10 8-bit plaintext 8-bit plaintext Shift IP-1 IP K1 fK P8 K1 fK Shift SW SW K2 fK P8 K2 fK IPÃ¢â¬â1 IP 8-bit ciphertext 8-bit ciphertext Figure C. 1 Simplified DES Scheme 10-bit key 10 P10 5 5 LS-1 LS-1 5 5 P8 K1 8 LS-2 LS-2 5 5 P8 K2 8 Figure C. 2 Key Generation for Simplified DES 8-bit plaintext 8 IP 4 fK 4 E/P 8 F 8 + 4 4 2 K1 2 S0 S1 P4 4 + 4 SW 4 fK 4 E/P 8 F 8 + 4 4 2 K2 2 S0 S1 P4 4 + 4 IPÃ¢â¬â1 8 8-bit ciphertext Figure C. 3 Simplified DES Encryption Detail
Sunday, January 5, 2020
Elaborate on the Great Awakening. How did the movement impact the ideological development of the colonies? The colonies were founded in the spirit of a relatively rigid conception of divine election. According to the Calvinist notion which dominated at the time, God had already chosen whom he would save and it was incumbent upon the elect to demonstrate their fitness for heaven upon earth. Gradually, over the course of the 18th century, the rationalist ideas of the Enlightenment that had become common currency in Europe began to permeate America. Religious zeal began to wane, and a more secular approach to life and education was adopted in urban locations and at elite institutions like Harvard and Yale. However, in rural areas of America there was profound resistance to this notion, and the Great Awakening was a response to the perceived negative influence of this secularization (Faragher et al 2009: 120). Preachers like Jonathan Edwards used fire metaphors to counterbalance what many felt was the new spiritual coldness of the rationalist era (Faragher et al 2009: 120). George Whitefield was one of the most influential speakers of the era, and promised an egalitarian salvation for all, regardless of denomination, so long as there was an acceptance of the divine in the listeners heart. This spilt between the secular and the urban and the rural and the religious parallels many of the current red and blue divisions of our own era, in which the social worldview ofShow MoreRelatedWhy Nova Scotia Failed to Join the American Revolution2306 Words Ã |Ã 10 Pagesgeographic, as well as religious factors that led to Nova ScotiansÃ¢â¬â¢ lack of attachment to revolutionary ideology in the colonies. During the time of the American Revolution, Nova Scotia was geographically on the northeastern frontier of Massachusetts. No geographical feature separated Nova Scotia from Maine, which meant that the Canadian province was very much a part of the Massachusetts colony. The question remains, therefore, why Nova Scotia failed to join the American Revolution in 1776. There were,Read MoreHY 1110-101-6 Unit II assessment Essay1580 Words Ã |Ã 7 Pagesincluding proper capitalization and middle names or initials. 6. When answering theÃ · written response questions please follow these requirements: a. Your answer to each question should contain a minimum 200-word response. b. Spelling and grammar will impact your grade. Make certain to proofread each response carefully before clicking on the submit button. c. General encyclopedias are not acceptable sources. i. Examples include, but are not limited to, Wikipedia, Encarta, and World Book. d. MakeRead MoreAp Exam Essays1660 Words Ã |Ã 7 PagesAP Exam Essays 2001-2010 2010 AP Exam Essays 1. In what ways did ideas and values held by Puritans influence the political, economic, and social development of the New England colonies from 1630 through the 1660s? 2. Analyze the political, diplomatic, and military reasons for the United States victory in the Revolutionary War. Confine your answer to the period 1775Ã¢â¬â1783. 3. Analyze the ways in which controversy over the extension of slavery into western territories contributed to the comingRead MoreIdeology Behind American Revolution Essays1890 Words Ã |Ã 8 Pagesseparation of colonial possessions from the home nation and a coalescing of those former individual colonies into an independent nation. Summary The American revolutionary era began in 1763, after a series of victories by British forces at the conclusion of the French and Indian War (also, Seven Years War) ended the French military threat to British North American colonies. Adopting the policy that the colonies should pay a larger proportion of the costs associated with keeping them in the Empire, BritainRead MoreEssay about Three Causes of World War I1734 Words Ã |Ã 7 Pagestreaties, the origins of the war continued to be an issue of utmost political importance in the years to come. The Great War had its roots in 1870 in the grand expansion and uncontrolled ambitions of Bismarck and the new Germany (Wolfson et al 1997). Imperialism, which began to emerge around the turn of the 20th century also played a decisive role. Fights over the colonies contributed to the establishment of complex set of international alliances, which helped to destabilizeRead MorePublic Activities of Women in the Early United States Essay1947 Words Ã |Ã 8 Pageshowever, overarching patterns existed, reflecting a common public attitude toward women at the time. Economic opportunities and gender labor division, often informed by cultural values, for women differed depending on the colony and its individual demands and local customs. In some colonies, the labor value of European women was worth more in the New World than at home, meaning that more economic opportunities could be found for women in the early United States; however, female slaves and indentured servantsRead MoreEssay about The Evolution of Democracy in Georgia5043 Words Ã |Ã 21 Pagesmentioned the short-lived Georgian Democratic Republic, which managed to survive for three halcyon years... 1918-1921, the period lovingly referred to by Georgians as independent Georgia.3 This brief period was critically important for the development of a Georgian nationalism. In effe ct, the existence of Georgia as an independent nation led to the birth and initial growth of nationalism in Georgia. The history of Georgia from 1917 to 1921 shows a steadily increasing national feeling, which wasRead MoreAn Evaluation of an on-Farm Food Safety Program for Ontario Greenhouse Vegetable Producers; a Global Blueprint for Fruit and Vegetable Producers51659 Words Ã |Ã 207 Pagescontinue to fund real-world practical research and continue to develop the food safety professionals of tomorrow. February 6, 2005 Ben TABLE OF CONTENTS Chapter 1. A Review Of Current And Relevant Publications Relating To The Development Of Risk-Based On-Farm Food Safety Practices For Produce In Canada. 1 Introduction 1 Microbial food safety 2 Risk analysis 5 Risk 7 Risk-based food systems 14 Microbial food safety risks and produce 18 Factors of pathogen contaminationRead MoreLibrary Management204752 Words Ã |Ã 820 PagesSilipigni Connoway Library of Congress Subject Headings: Principles and Application, Fourth Edition Lois Mai Chan Developing Library and Information Center Collections, Fifth Edition G. Edward Evans and Margaret Zarnosky Saponaro Metadata and Its Impact on Libraries Sheila S. Intner, Susan S. Lazinger, and Jean Weihs Organizing Audiovisual and Electronic Resources for Access: A Cataloging Guide, Second Edition Ingrid Hsieh-Yee Introduction to Cataloging and Classification, Tenth Edition Arlene G