Thursday, October 31, 2019

Hate Speech Summary Essay Example | Topics and Well Written Essays - 500 words

Hate Speech Summary - Essay Example However, there are those who say that speech should be restricted if it encourages hatred or prejudice against someone of a different race, sex, religious group, or sexual orientation. One example that the article uses is that of the University of Michigan in Ann Arbor from 1987. Racist fliers were distributed that used foul language such as saucer lips, porch monkeys, and jigaboos. Many universities responded to this outrage by banning hate speech through the use of speech codes. The reasoning for this is that hate speech may encourage people to go out and attack certain individuals based on their ethnic or religious background. The article uses statistics to prove that the number of hate groups is on the rise in the U.S. Some of the major groups that it mentions include the Ku Klux Klan, neo-Nazis, and the Nation of Islam. The problem with acting against these hate speech groups is that it would be a violation of their First Amendment rights, which protects them from prosecution fo r any words that they might say about another group of people. In my opinion, banning people from freedom of speech opens up a whole can of worms. This is because once you ban one group from speaking out, it would only seem fair to ban the next one, and the next one, and so on. Also, the matter of who is the authority to decide what type of speech is allowed and what type of speech is not allowed becomes a dividing issue. In fact, cracking down on hate speech could result in an increase of even more hate speech; this is one outcome that those who champion restricting hate speech would not want to see. I agree with the views of David Cole, a law professor at Georgetown University in Washington D.C., who says that the restriction of hate speech would only take away the rights of one particular group only to give even more rights to another. This would be biased because it would be treated

Monday, October 28, 2019

To what extent does the media assist or limit the conduct of military operations Essay Example for Free

To what extent does the media assist or limit the conduct of military operations Essay Some form of controversy has been regularly generated between the press and the military especially the question of media access to the battlefield. Conflict between reporter and the military is not new. As war correspondents became of age in the Civil War, the military began its determination to protect its operations. The media have often called this determination â€Å"censorship. † The military/media relationship is seriously degraded because of mistrust between the two entities. Sources of this mistrust are analyzed, to include: cultural differences; the perception of biased reporting; misunderstanding and ignorance; and speculation. In any operation there are many aspects of military/media relations which include operational security, the press pool system, logistics, public opinion, etc. However, there has been animosity between journalists and the military. The military frequently views press as offering only potential harm not benefit (Carruthers, 2000). The press, on the other hand, has a history of being critical of the military. For instance, U.  S. media and professional associations insist that the military must accommodate the press in wartime situations, for three good reasons which include: the press has always been present when troops have been involved; the public has a fundamental right to know; and restrictions put violate the First Amendment. Yet on some ground between the military operational requirement for information to be made available only on a basis of needing to know, and the right of the citizens of a democracy to know about what their military is doing, lies a middle ground (Dandeker, 1995). Generally, soldiers understand fighting and journalists understand communicating, yet none of them knows that the political impact of combat depends on how the fighting is communicated. Hence both sides need one another. Key civilian and military leaders have now embraced the fact that successful inclusion of the press to ensure adequate coverage is not an optional luxury, but rather is a necessity in todays information age and the expectations of the citizens. The benefits gained from the news media coverage of military operations outweigh the drawbacks, and therefore press coverage should be permitted. There is no set solution appropriate for every situation, since every war is unique. But improvements in military planning, officer training, and press indoctrination will help solve some of the current problems in the military/media relationship. How media assist the conduct of military operations In todays technology-driven world, the media is a fourth dimension added to air, land, and sea and the operational commander must contend with this potent entity to be relevant. Moreover, the media is an accelerator of immense importance in todays world in respect to the operational factors of time, space, and force affecting the operational commander decision-making. The reason why the military should engage the media is probably best stated by General (Ret) Dennis J.  Reimer in a 1997 memorandum to his senior Army leaders. â€Å"Our success, as an institution, depends on the degree to which all senior leaders communicate clearly to the people. It is in fact part of your METL [Mission Essential Task List],† said Reimer. To begin with, the military has the need for improved defense related public relations. The media is an important force multiplier, and it must be harnessed to win the battle of the hearts and minds of the people and keep them fully abreast of developments at home and abroad. This will ensure that they are not misled by rumors, propaganda and dis-information; this could happen if they do not have access to a truthful and speedy account of the facts and the progress of events. Secondly, the media is important in projecting the operations to the remotest parts of the country and arousing nationalism and patriotic fervour in the nation. Thirdly, having a media team at each level of command down to the battalion level is of great help to project the activities of the armed forces through films and other means. The procedure evolved provide for regular operational briefings by the operational/intelligence staff at headquarters or by the concerned corps/divisional commanders. Fourthly, training selected service officers and men in media work by running suitable courses for them on a regular basis and also media personnel need to understand the organisation, role, ethos and fighting capabilities of the armed forces and the characteristics of its various units is most beneficial (that is , media-military interface). Fifthly, limiting journalists access to a war can also work against the military. Galloway pointed to the Persian Gulf War as an example. When the war was over you had no proof of the efficacy of your efforts and your soldiers efforts to take up on [Capitol] Hill at a very difficult time when troop cuts, budget cuts, drawbacks are all under way, he said. Despite the constant tension and sometimes opposing goals of the military and the media, the militarys primary role is to support and defend the Constitution of the nation, the First Amendment of which is freedom of speech and of the press. Finally, having media-military interface there is hope for prompt and timely information in an age when news is increasingly being transmitted and used instantly, with TV news being broadcast on the hour, every hour (Krishna, 2000). How media limit the conduct of military operations The longstanding conflict between the news medias need for access and the militarys need for secrecy has continued during the war on terrorism, journalists agree. If anything, the tension between th e two groups has gotten worse. For instance, during the war in Afghanistan, Pentagon senior spokesman Bryan Whitman said the military understands reporters concerns but that the top priority must be troop safety. Ensuring †¦ that what we do with the news media in the Pentagon or in the field doesnt do anything to jeopardize the success of the operation or endanger the personnel that are participating in the military operation †¦ has to be balanced all the time with †¦ how much reporting can be taking place at any given moment, he said. (Wilcox Jr, 2002) But author and former war correspondent Joe Galloway, whose book We Were Soldiers Once †¦ and Young documents the first major U. S. ground battle of the Vietnam War, said that Vietnam changed the mindset of the military because of the open and unrestricted reporting done by journalists. Most of the times, the military is willing to learn, the journalists are not; pointed out by Galloway as evidenced by the numerous invitations he has received from the military to speak about the subject. He has not received any invitations to speak to news organizations or journalism schools. The media is also believed by them reporting from the battlefield turn the people against the military and against the war. Galloway also adds that, while Vietnam remains a model for him in terms of military/media relations, U. S. led military operations in Grenada and Panama were disastrous in terms of the medias ability to cover those conflicts because of military restrictions. Also, keeping the media at a greater distance from combat operations than security requires would contribute to a bitterly adversarial military-media relationship. This, in turn, would likely hurt the war effort in the long run by inviting relentlessly negative coverage and fanning public distrust. Furthermore, the media are a fact of military operations and here to stay as well as being vital to all democratic governments seeking to discharge their duty to explain. Military control of information during war time is also a major contributing factor to propaganda, especially when the media go along with it without question. The military recognizes the values of media and information control very well. The military often manipulates the mainstream media, by restricting or managing what information is presented and hence what the public are told. For them it is paramount to control the media. This can involve all manner of activities, from organizing media sessions and daily press briefings, or through providing managed access to war zones, to even planting stories. Over time then, the way that the media covers conflicts degrades in quality, critique and objectiveness. As one military puts it,† Information is the currency of victory. † From a military’s perspective, information warfare is another front on which a battle must be fought. However, as well as needing to deceive adversaries, in order to maintain public support, information to their own public must no doubt be managed as well. That makes sense from a military perspective. Sometimes the public can be willing to sacrifice detailed knowledge. But that can also lead to unaccountability and when information that is presented has been managed, propaganda is often the result. Finally, the military have had to adapt since 1982 is the speed of reporting made possible by modern communications. Today, a reporter with a digital camera, a laptop and a satellite phone, all of which can fit in a day sack, can file stories minutes after events and even live if they have a bit more by way of equipment. Control is much more difficult if reporters dont need military’s help to file a story. Because they can act so quickly, and are expected to do so by their editors or newsrooms, military dont have the time to ponder at length our response to events, we must respond quickly whilst still, crucially, maintaining accuracy. For instance, this happened on TELIC 1 (Iraq) but, it was not a great success. Conclusion Throughout history, no matter the time or war, there has always been a conflict between the military and the media. The media’s right to a free press conflicts with the military’s concern for operational security. It serves no constructive purpose, however, to ignore this conflict nor does it serve a purpose by adding to it. Therefore, it is time for the military to accept the media as part of the battlefield of the 21st century, and to understand and prepare for the media as it does for other battlefield elements. Commanders should ensure that their troops receive not only the equipment, but also the training to survive in adverse battlefield environments. The point here is to point out that no matter whether the military likes or dislikes the media, the media will be a part of the battlefield environment just as the weather. As is the case with inclement weather, the better the commander plans and prepares his or her troops, as well as themselves for the media, the better they and their troops will do when faced with a reporter. If we are going to get this right, the military must not resort unnecessarily to secrecy or to lightly tarring independent journalists as disloyal. The media should not frivolously cry censorship. And each should work harder to understand the views and accommodate the needs of the other.

Saturday, October 26, 2019

Statistical techniques for cryptanalysis

Statistical techniques for cryptanalysis Introduction: Cryptography is the art of writing messages in code or cipher, to disguise, and thereby secure the content of a particular stream of text. When encrypted, a plain text message can be revealed only through the use of the key used to encode the cipher. Cryptography does not mask the existence of the message, but does disguise its content [1]. In contrary, cryptanalysis is the art of recovering the plaintext of a message without access to the key. Successful cryptanalysis may recover the plaintext or the key for a specific ciphertext [2]. There are five general types of cryptanalytic attacks:- 1. Ciphertext-only attack: In this type of attack, the cryptanalyst has a series of cipher texts encrypted using the same encryption algorithm. Then, the cryptanalyst deduces the plain text of each of the cipher texts or identifies the key used to encrypt the cipher text 2. Known-plaintext attack: In this type of attack, the cryptanalyst has a series of ciphertext and their corresponding plaintext values encrypted using a specific key. The cryptanalyst then tries to deduce the key by forming a relationship between the ciphertext and plaintext entries. 3. Chosen-plaintext attack: In this type of attack, the cryptanalyst not only has access to the ciphertext and associated plaintext for several messages, but he also chooses the plaintext that gets encrypted. His job is to deduce the key used to encrypt the messages or an algorithm to decrypt any new messages encrypted with the same key. 4. Frequency analysis: It is the study of thefrequency of lettersor groups of letters in aciphertext. The method is used as an aid to breakingclassical ciphers. Frequency analysis is based on the fact that, in any given stretch of written language, certain letters and combinations of letters occur with varying frequencies. 5. Rubber-hose cryptanalysis: The cryptanalyst threatens, tortures or blackmails the person who has the key until they give it up. Among the many cryptanalytic techniques, frequency analysis or frequency counting is the most basic technique applied to break substitution cipher based algorithms, among the varied list of attack techniques. The basic use of frequency analysis is to first count the frequency of ciphertext letters and then associate guessed plaintext letters with them. More complex use of statistics can be conceived, such as considering counts of pairs of letters digrams, trigrams, and so on. This is done to provide more information to the cryptanalyst. It exploits the weakness in the substitution cipher algorithm to encrypt similar plaintext letters to similar ciphertext letters. Frequency analysis based cryptanalysis techniques were used to break ciphers based on the traditional cryptographic algorithms, but they do not work well with the modern block cipher based cryptographic algorithms. Statistical properties of English: Frequency analysis based cryptanalysis uses the fact that natural language is not random in nature and single alphabetic based substitution does not hide the statistical properties of the natural language. In the case of encryption using monoalphabetic substitution, to start deciphering the encryption it is useful to get a frequency count of all the letters. The most frequent letter may represent the most common letter in English, E followed by T, A, O and I whereas the least frequent are Q, Z and X [7]. Statistical patterns in a language can be detected by tracing the redundancy of the text in the language. It has been realized that various universal regularities characterize text from different domains and languages. The best-known is Zipfs law on the distribution of word frequencies [5], according to which the frequency of terms in a collection decreases inversely to the rank of the terms. Zipfs law has been found to apply to collections of written documents in virtually all langu ages [5]. English language characters have a very high redundancy rate when used for cryptographic substitutions. If we have a message encrypted using the substitution cipher that needs to be cracked, we can use frequency analysis. In other words, if the sender has used an encryption scheme, that replaces one letter in the English to be another letter in English, we can still recognize the original plain text as, the frequency characteristics of the original plain text will be passed on the new cipher text characters [4]. To apply frequency analysis, we will need to know the frequency of every letter in the English alphabet, or the frequency characteristics of the language used by the sender to encrypt the text. Below is a list of average frequencies for letters in the English language. So, for example, the letter E accounts for 12.7% of all letters in English, whereas Z accounts for 0.1 %. All the frequencies are tabulated and plotted below:- For example, let us consider the following sentence: We study Cryptography as part of our course. Using a simple substitution cipher, let us consider the following: a->c , b-> d, c->e..w->y, x->z, y->a, z->b So, the cipher text becomes: yg uvwfa etarvqitcrja cu rctv qh qwt eqwtug. A simple frequency analysis of the cipher text can be carried out and the results are as given below: The above data can be used by a cryptanalyst to identify the key or the plaintext by using simple substitution to the cipher text till a suitable plaintext value is not identified. Apart from the use of mono alphabetic frequency analysis, cryptanalysts also identify frequency of paired letters better known as digram frequency and that of three letter words, called as Trigram frequencies. These help the cryptanalyst to exploit the redundant features of English language to break the cipher. The most common Digrams (in order): th, he, in, en, nt, re, er, an, ti, es, on, at, se, nd, or, ar, al, te, co, de, to, ra, et, ed, it, sa, em, ro. The most common Trigrams (in order): the, and, tha, ent, ing, ion, tio, for, nde, has, nce, edt, tis, oft, sth, men Table 1: Digram and Trigram Frequencies [6] These help in identifying the most commonly used terms in English to break a cipher. The digram frequencies are used to break two letter words such as an, to, of etc and the trigram frequencies are used to break three letter words such as the, are, for etc. After breaking a significant two letter and three letter words, it is practically east to identify the key from the cracked values of plaintext by matching the corresponding values in the ciphertext. This huge weakness in English language is used to break cipher texts encrypted using simple algorithms that make use of English alphabets. In practice the use of frequency analysis consists of first counting the frequency of ciphertext letters and then assigning guessed plaintext letters to them. Many letters will occur with roughly the same frequency, so a cipher with Xs may indeed map X onto R, but could also map X onto G or M. But some letters in every language using letters will occur more frequently; if there are more Xs in the c iphertext than anything else, its a good guess for English plaintext that X is a substitution for E. But T and A are also very common in English text, so X might be either of them also [4]. Thus the cryptanalyst may need to try several combinations of mappings between ciphertext and plaintext letters. Once the common single letter frequencies have been resolved, then paired patterns and other patterns are solved. Finally, when sufficient characters have been cracked, then the rest of the text can be cracked using simple substitution. Frequency analysis is extremely effective against the simpler substitution ciphers and will break astonishingly short cipher texts with ease. Attacks on Traditional algorithms Encrypting using traditional algorithms have been defenseless against cryptanalytic attacks as they use bit by bit encryption, which can be easily broken using frequency analysis based attacks. 1. Caesar Cipher: Considering the case of one of the oldest ciphers, the Caesar Cipher, this cipher replaces one letter of the plaintext with another to produce the ciphertext, and any particular letter in the plaintext will always, turn into the same letter in the cipher for all instance of the plaintext character. For instance, all Bs will turn into Fs. Frequency analysis is based on the fact that certain letters, and combinations of letters, appear with characteristic frequency in essentially all texts in a particular language [9]. For instance, in the English language, E is very common, while X is not. Likewise, ST, NG, TH, and QU are common combinations, while XT, NZ, and QJ are very uncommon, or even impossible to occur in English. This clearly shows how the Caesar cipher can be broken with ease by just identifying the frequency of each letter in the cipher text. A message encrypted using Caesar cipher is extremely insecure as an exhaustive cryptanalysis on the keys easily breaks the code. 2. Substitution Ciphers: The Caesar cipher forms a subset of the entire set of substitution ciphers. Here, the key of the encryption process is the permutation of all the twenty six characters of the English alphabets. Rather than choosing a particular key for all encryption process, we use a different key for successive encryption processes. This technique increases the number of possible key to 26!, which is about 4 X 1026, which eliminates the exhaustive cryptanalysis attack on the keyspace [7]. To decrypt the cipher the, statistical frequency distribution of single letter occurrence in English language is analyzed. Then, the digram and trigram frequencies of standard English words are compared with the frequencies of the trigrams in the cipher to finally reconstruct the key and in turn decipher the text. This is an efficient method to break the substitution cipher as, each plaintext letter is represented by the same ciphertext letter in the message. So, all properties of plaintext are carried on to the cipher text. 3. Vigenere Cipher: In a Vigenere cipher, there is greater security as, a given plaintext letter is not always represented by the same ciphertext letter. This is achieved by using a sequence of n different substitution ciphers to encrypt a message. This technique increases the possible number of keys from 26! to (26!)n. Although this was considered to be unbreakable, the Kasiskis method of attacking a Vigenere cipher yielded successful results of decrypting the message. According to this method, the first step is to find the key length (n). Find identical segments of plain text that get encrypted to the same ciphertext, when they are b positions apart, where b=0 mod n. According to Kasiski, the next step is to find all the identical segments of length greater than 3, and record the distance between them [7]. This can then be used to predict the length of the key (n). Once this is found the key is found by an exhaustive search of the keyspace for all possible combinations to identify the key. This is done by substituting all possible values for n to generate substrings. Once the substring is formed, the plaintext message can be automatically identified by using the back substitution of the key into the cipher [7]. This can be done for all possible values for n until finally arriving at the actual key, which reveals the plaintext that was encrypted. This method can take a long time to break the key to identify the plaintext incase the key length is very long, as the keyspace value would be large for larger keys. Defeating frequency based attacks: Frequency based attacks have been used for a long time to break traditional encryption algorithms. It uses the fact that, traditional encryption algorithms do not eliminate the statistical properties of the language upon encryption. The first way to defeat frequency based attacks is to encrypt blocks of characters at a time rather than single letters [7]. This would ensure that, the same text in the plaintext is not encrypted to the same text in the ciphertext upon encryption. For e.g., if we use the Caesar cipher encryption scheme, the word ADDITIONAL will be encrypted to CFFKVKQPCN, we can see that the alphabets A, D and I are repeated more than once and at each instance, the encryption scheme used always encrypts A to C, D to F and I to K. This can clearly be used during frequency analysis to analyze the redundancy of the characters and in turn map them back to get the original plaintext character. Using a block encryption scheme, one can be satisfied that, this phenomenon does not occur as, in a block encryption scheme, the whole plaintext is broken into chunks or blocks of data, that is fed in as input to the encryption algorithm. The algorithm then, reads the input block along with the key and encrypts th e complete block of plaintext, rather than individual characters, so there is a smaller chance that two blocks will produce the same chunk of ciphertext. The second way of defeating frequency analysis is to make use of synonyms of words [7], rather than repeating the same word over and over again in a sentence. There are a lot of words in English, which have more than one synonym, thus providing with a set of words to be used as convenient in the particular context. To help in the selection of a synonym, grammar checking would have to be used to ensure that, the meaning expressed in the sentence is not altered by changing the words. Attacks against this technique could include creating a list of the best synonyms, but this would not help the attacker as different word could be used at each instance the same meaning needs to be expressed, defeating the benefit of this technique. This technique of using alternate words to represent common words to defeat cryptanalysis attacks is called Homophones [7] in cryptography. A third technique that can effectively defeat cryptanalysis is Polyalphabetic substitution, that is, the use of several alphabets to encrypt the message [3], rather than using the same substitution technique again and again. The Vigenere Cipher is a form of Polyalphabetic cipher. This ensures that, no two characters are encrypted to the same ciphertext alphabet in the same message. This ensures that, direct frequency analysis of the cipher is not possible to successfully retrieve the original message. However, other techniques need to be used to identify the key length, if this is possible, then frequency analysis attack could be used to identify the original plaintext message successfully. Finally, a possible technique that could be used to defeat frequency analysis is to encrypt a single character of plaintext with two ciphertext characters [3]. Upon encountering the same character twice, then different characters should be used to encrypt the message. This can be achieved by using a key size double that of the plaintext message and then encrypting the same plaintext with two values in the key and save them together for the same plaintext character. This would ensure that no two plaintext characters will have the same ciphertext character, defeating the frequency analysis method of breaking the cipher. Modern encryption algorithms and cryptanalysis: Modern cryptographic algorithms take a better approach in defeating frequency analysis based attacks. The cryptographic algorithms nowadays use block encryption, rather than encrypting characters bit by bit, thus eliminating the redundancy of ciphertext alphabets for similar plaintext alphabets. Block ciphers are the central tool in the design of protocols for shared-key cryptography. A block cipher is a function E: {0, 1}k ÃÆ'- {0, 1}n à ¢Ãƒ ¢Ã¢â€š ¬Ã‚   {0, 1}n. This notation means that E takes two inputs, one being a k-bit string and the other an n-bit string, and returns an n-bit string [2]. The first input is the key, which is used to encrypt the secret message. The second string is called the plaintext, and the output is called a ciphertext. The key-length k and the block-length n are parameters associated to a specific block cipher. They vary from block cipher to block cipher, and depend on the design of the algorithm itself. Some of the most trusted symmetric ciphers inclu de AES, Triple-DES, Blowfish, CAST and IDEA. In public-key cryptography, the most commonly used cryptosystems are RSA and the Diffie-Hellman systems, which have not been found to have any vulnerabilities till date. Preferably, the block cipher E is a public specified algorithm. In typical usage, a random key K is chosen and kept secret between a pair of users. The function EK is used by the sender to encrypt the message, for a given key, before sending it to the intended receiver, who decrypts the message using the same key [2]. Security relies on the secrecy of the key. So, at first, one might think of the cryptanalysts goal as recovering the key K given some ciphertext, intercepted during transmission. The block cipher should be designed to make this task computationally difficult. In order to achieve this, the algorithms that are used to encrypt the message must be designed with a high degree of mathematical complexity, which cannot be reversed to obtain the plaintext from a known ciphertext. The length of the key used during encryption of a message plays an important role in deciding the effectiveness of an algorithm. Key length is conventionally measured in bits, and most of the well known strong ciphers have key lengths between 128 and 256 bits. A cipher is considered strong if, after years of attempts to find a weakness in the algorithm, there is no known effective cryptanalytic attack against it. This indicates that, the most efficient way of breaking an encrypted message without knowing the key used to encrypt it is to brute force it, i.e. trying all possible keys. The effort required to break an encrypted message is determined by the number of possible keys, known as thekeyspace. Knowing the speed of the computer to break the key, it is easy to calculate how long it would take to search the keyspace to break a particular cipher [2]. For example, considering a cipher that uses 128-bit keys, each bit can either be 0 or 1, so, there are 2128 or 3ÃÆ'-1038 keys approximately. Suppose we imagine that about ten billion computers are assigned the task of breaking the code, each capable of testing ten billion keys per second, then, the task of running through the entire keyspace would take around 3ÃÆ'-1018seconds, which is about 100 billion years. But, in fact, it would be necessary to run through only half the keyspace to hit upon the correct key, which would take around 50 billion years. This is longer than the estimated age of the universe according to modern cosmology, which is about 15 billion years [2]. This shows that, it is practically infeasible to crack modern cryptographic algorithms using Brute Force attacks. So, one can imagine the effectiveness of the modern cryptographic algorithms and their resistance towards cryptanalytic attacks. Conclusions: Cryptography has progressed in recent years and modern cryptographic algorithms have proved to be successful in defending against most forms of cryptanalytic attacks. Frequency analysis based attacks have proved to exploit the weaknesses in traditional encryption algorithms into revealing the plaintext message that was encrypted using them. The natural language used to encrypt messages is not considered to be random in nature, which is exploited by frequency counting based attacks. Based upon the frequency of letters that occur in the ciphertext, one can guess the plaintext characters due to their redundancy rate and the specific combination of letters in a word. This weakness can be repelled by using stream ciphers, which do not carry the redundancy in the plaintext to the ciphertext. Modern block cipher, encrypt a chunk of plaintext into ciphertext and vice versa, eliminating the redundancy of language used in encryption. Although the algorithm plays an important part, it is the key length used in block ciphers that helps in repelling cryptanalysis. Modern ciphers use a key length starting from 128 bits, eliminating the possibility of a brute force attack to decrypt the message. The higher the key length, the more time it takes to break these ciphers. These advantages have made modern cryptographic algorithms more popular among the security community. No known weaknesses have been found in these algorithms yet, that may allow one to identify the plaintext message. Bibliography: [1] Stallings, W., Cryptography and Network Security, Chapter 1, Third Edition, Prentice Hall, 2003 [2] Schneier, B., Applied Cryptography, Chapter 1, Second Edition, John Wiley Sons, New York City, New York, USA, 1996 [3] Hart, G.W., To Decode Short Cryptograms, Communications of the ACM 37(9), 1994, pp. 102-108 [4] Lee, K.W., Teh, C.E., Tan, Y.L., Decrypting English Text Using Enhanced Frequency Analysis, National Seminar on Science, Technology and Social Sciences (STSS 2006), Kuantan, Pahang, Malaysia [5] Zipf, GK., Human Behaviour and the Principle of Least Effort, 1949, Cambridge: Addison Wesley Publications. [6] Lewand, R.E., Cryptological Mathematics, The Mathematical Association of America, 2000, Pages 345-346 [7] Stamp, M and Low, R.M., Applied Cryptanalysis, 2007, Chapter 1 and 2, John Wiley Sons, New York City, New York, USA [8] http://www.simonsingh.net, Online internet frequency analysis tools [9] http://www.textalyser.net, online text analysis and frequency analysis information

Thursday, October 24, 2019

The Significance of Letters in Pride and Prejudice by Jane Austen Essay

The Significance of Letters in Pride and Prejudice by Jane Austen Letters play a very important role in 'Pride and Prejudice'. They can link the story because letters provide information which we would not have found out from the dialogue between the characters. We an also find out extra background information which can help with the reader's understanding of characters, the plot and the novel in general. Letters can reveal characters' personalities and how they feel about the other characters in the novel, for example Miss Bingley's feelings about Jane. Letters are used as a dramatic device in 'Pride and Prejudice' to further the plot, link the story and to inform the readers of the character's personalities. Letters are also an extremely important part of 'Pride and Prejudice' because at the time when the novel was written, letters were the only way of communicating other than through word of mouth. Letters can be used to deliver good and bad news at any time. They did not have telephones so a letter would be the most appropriate way of keeping touch with friends and family. Jane and Elizabeth are two of the main characters in the novel and they write to each other frequently during their visits away from each other. The sisters share some parts of their personalities. Both are caring, loving and considerate towards other people, but Jane is extremely loving and she does not want to judge any of the other characters in the novel before she has heard the entire story. This is because she does not want to think badly of anyone. We know this from Jane?s letter to Elizabeth regarding the actions of Miss Bingley and Miss Hurst ... ... the novel would make no sense. Austen uses letters to make the novel much more interesting as it is different from constant dialogue. She superbly shows that there are different ways to provide the reader with information other than through dialogue or through the narrator. Letters are important in ?Pride and Prejudice? because they can enhance the plot, change the plot, provide the reader with additional information and can also show character. All of the letters from above contribute to the readers understanding of the novel, to the plot and to add to the characterisation and without these letters the novel would seem incomplete. This just proves that letters play a major role in 'Pride and Prejudice'. Bibliography: Austen, Jane. Pride and Prejudice. Ed. Donald Gray. New York: W.W. Norton & Company, 1996

Wednesday, October 23, 2019

High School and Younger Girls Essay

I chose to write this paper on bullying and its effect on school. In my middle school years, after I had moved here from Alaska, I was bullied a lot because I was new to the school and it was such a small town. It had effects on me that still affect me today. For example, if someone says my name or taps me on the back I don’t turn around because when I was younger girls would do that to me and then laugh at me. I feel bullying is a serious subject and that’s why I chose to look further in to it. The article I chose to do was Bullying in School: The Traumatic Effects of Bullying on Children by Dr. Terry Ehiorobo. The beginning of his article starts off by explaining how bullying has gotten out of hand and what is being done about it. For example, a child getting bullied ended up suing his school because on one was doing anything to stop the bullying, and he even won. In his article he explains different types of bullying situations using certain examples. Dr. Ehiorobo says in his article, â€Å"The world of bullying has a life of its own. It takes no prisoners and its effects can be long lasting and endemic in some cases.† Bullying is a very serious issue in today’s society and I’m glad something is being done to put a spotlight on it. If a stop is put to bullying kids will do better in school, therefor having a better effect on the rest of their lives. Works Cited Ehiorobo, Terry Dr. â€Å"Bullying in School: The Traumatic Effects of Bullying on Children.† CPI. n.p. 25 September 2013. Web March 2012. http://www.crisisprevention.com/Resources/Article-Library/Nonviolent-Crisis-Intervention-Training-Articles/Traumatic-Effects-of-Bullying-Children

Tuesday, October 22, 2019

The Rise of Al Capone and Lucky Luciano

The Rise of Al Capone and Lucky Luciano The Five Points Gang is one of the most infamous and storied gangs in the history of New York City. Five Points was formed in the 1890’s and maintained its’ status until the late 1910’s when America saw the beginning stages of organized crime. Both Al Capone and Lucky Luciano would rise out of this gang to become major gangsters in America.   The Five Points gang was from the lower east side of Manhattan and numbered as many as 1500 members including two of the most recognizable names in â€Å"mob† history – Al Capone and Lucky Luciano – and who would change the way that the Italian crime families would operate. Al Capone Alphonse Gabriel Capone was born in Brooklyn, New York on January 17, 1899, to hardworking immigrant parents. After quitting school after the sixth grade, Capone held several legitimate jobs that included working as a pinboy in a bowling alley, a clerk in a candy store, and a cutter in a book bindery. As a gang member, he worked as a bouncer and bartender for fellow gangster Frankie Yales at the Harvard Inn. While working at the Inn, Capone received his nickname â€Å"Scarface† after he insulted a patron and was attacked by her brother. Growing up, Capone became a member of the Five Points Gang, with his leader being Johnny Torrio. Torrio moved from New York to Chicago to run brothels for James (Big Jim) Colosimo. In 1918, Capone met Mary Mae Coughlin at a dance. Their son, Albert Sonny Francis was born on December 4, 1918, and Al and Mae were wed on December 30th. In 1919, Torrio offered Capone a job to run a brothel in Chicago which Capone quickly accepted and moved his entire family, which included his mother and brother to Chicago. In 1920, Colosimo was assassinated – allegedly by Capone – and Torrio took control of Colosimo’s operations to which he added bootlegging and illegal casinos. Then in 1925, Torrio was wounded during an attempted assassination after which he placed Capone in control and moved back to his home country of Italy. Al Capone was now finally the man who was in charge of the city of Chicago. Lucky Luciano Salvatore Luciana was born on November 24, 1897, in the Lercara Friddi, Sicily. His family immigrated to New York City when he was ten years old, and his name was changed to Charles Luciano. Luciano became known by the nickname â€Å"Lucky† which he claimed he earned by surviving a number of severe beatings while growing up on the Lower East side of Manhattan. By the age of 14, Luciano dropped out of school, had been arrested numerous times, and had become a member of the Five Points Gang where he befriended Al Capone. By 1916 Luciano was also offering protection from the local Irish and Italian gangs to his fellow Jewish teens for five to ten cents a week. It was also around this time that he became associated with Meyer Lansky who would become one of his closest friends and his future business partner in crime. On January 17, 1920, the world would change for Capone and Luciano with the ratification of the Eighteenth Amendment to the U.S. Constitution prohibiting the manufacture, sale, and transportation of alcoholic beverages. â€Å"Prohibition† as it became known provided Capone and Luciano the ability to garner huge profits through bootlegging.   Shortly after the start of Prohibition, Luciano along with future Mafia bosses Vito Genovese and Frank Costello had started a bootlegging consortium that would become the largest such operation in all of New York and allegedly stretched as far south as Philadelphia. Supposedly, Luciano was personally grossing approximately $12,000,000 a year from bootlegging alone. Capone controlled all alcohol sales in Chicago and was able to set up an elaborate distribution system that consisted of bringing in alcohol from Canada as well as setting up hundreds of small breweries in and around Chicago. Capone had his own delivery trucks and speakeasies. By 1925, Capone was earning $60,000,000 per year from alcohol alone.