Saturday, October 5, 2019
Private Enterprise Essay Example | Topics and Well Written Essays - 1250 words
Private Enterprise - Essay Example Many private enterprises partner with the Department of Homeland Security to make sure that mitigation of threats is achieved as well as to defend themselves against threats. The same department is responsible for minimizing risks like terrorism attacks. Department of Homeland Security maximizes the ability where they are able to strongly respond to terrorist who attack the states or local governments (Kamien, 2006). Additionally, the department is concerned with prevention of disasters that may occur. Through the effort that is provided by the Department of Homeland Security, strong foundations with other department that are concerned with security matters are able to protect communities in the entire United States. Additionally, terrorism and treats of all kinds are minimized for the purpose of safeguarding the key rights of all the United States residents. Since the private sector in the United States operates approximately 85% of Critical Infrastructure and Key Resources (CIKR), this makes the Department of Homeland Security to engage measures to safeguard the infrastructure and resources that are owned by private sector. In addition, the protection of critical infrastructure is the work of the government and other security agencies. This ensures that CIKR are safeguarded so that the public and private sector may partner together thus making the economy to be stable. When the partnership is effective, collaboration is achieved where the Office of Infrastructure Protection (IP) is concerned with all the critical infrastructure and key resources. The department of the Infrastructure Protection (IP) will have to play a role where effort to reduce the risk of destruction or threat to the sector is emphasized through Critical Infrastructure Protection Program since it is the countryââ¬â¢s most productive sector (Bullock and Haddow, 201 2). To protect the private sector, government
Friday, October 4, 2019
The Language of Leadership Essay Example | Topics and Well Written Essays - 250 words - 1
The Language of Leadership - Essay Example There are five appropriate methods of ensuring that the organizationââ¬â¢s workforce harmoniously undertakes the tasks in accordance to the set rules and regulations, and in the absence of coercion. Modern leaders should serve as the center nerve of distributing favorable prepositions to the entire organization. Through the sharing of objectives, leaders set an equated and united organizations as the subjects realize their equated importance and choose to work in teamwork (Kadalie, 2006). Therefore, leaders may apply the collaboration and sharing techniques to ensure teamwork and united performances of tasks in a friendly environment. These variables shall eventually serve to ensure that all performances interrelate directly to the leaderââ¬â¢s vision of the organization (Schmid, 2009). Other factors that leaders may use in ensuring that leaders may use to recognize talents of the others include democratic, and dispersed approaches whereby the subjects are able to express their feelings and propose the various methods that they feel as appropriate in undertaking specific tasks. Lastly, leaders may use the dispersion techniques to stimulate integration and the realization of talents amongst his subjects in the organization (Halpern, & Lubar, 2003). Mainly, a leader serves as integral in stimulating performances to excellence and ensuring that all their
Thursday, October 3, 2019
Esprit Strategic Analysis Essay Example for Free
Esprit Strategic Analysis Essay In regard to a research of microenterprise in Macau, casino and gambling enterprise is the main source of income to the Macau economy. Over 80% of income is contributed in 2012. However, microenterprise is also taking an essential role to the healthy long-term development to the local economy. By doing so, a bundle of different strategies have to be conducted in each company in order to achieve the goal. Strategic Management is a way to identify competitive advantage and analyze the internal and external factors which influence oneââ¬â¢s performance. It also helps in making a bundle of decisions for future direction and attaining sustainable development by formulating and implementing appropriate strategies. In this report, company background information, vision and mission, a series of strategy formulations and analysis are provided. Furthermore, applying various strategies in actions and implementation are attached in the following. INTRODUCTION Cafà © Tai Lei Loi Kei is one of the historical cafe in Macau and their exclusive hand-made pork chop bun is the icon while it will come up in mind of locals and tourists when thinking of Macau. It was established in 1968, with nearly 50 years of history located at the Taipa village. The initiate owner of the cafe was Ms. Kuok Loi Ho but the business is transmitted to her daughter Ms. Chan Ka I and other two family members. In the 1960ââ¬â¢s, Taipa village is not well-developed as what people see today where there were lots of firecracker factories set up there. Ms. Kuok was originally operating this kind of business but it involves high risks and accidents were often occurred during that time. She later transformed her business in opening a cafe which was selling drinks only. At that period, there were many Portuguese working at the Municipal Council at Taipa next to the cafe. Ms. Kuok was taught by a Portuguese to make a pork chop bun with special Portuguese sauce and it becomes the reputable pork chop bun nowadays. Following the success of the business, more stores are rapidly opened in Macau and even Hong Kong. Besides of the flagship store at the Rua do Cunha, it can also be found in Venetian and one near Ruins of St. Paul. The food items are diversified for options which fish ball, squid, beef, and pork chop rice with onion sauce etc. are served as well. With good word-of-mouth and reputation and being recommended by many guidebooks, their main customers are tourists and it is said that the Tai Lei pork chop bun has to be tried when every tourists come to Macau. MISSION According to the owner of Cafà © Tai Lei Loi Kei said, their mission is ââ¬Å"Whoever talks about pork chop bun, the first brand name come up with in their mind is Tai Lei Loi Kei.â⬠Our group thinks that it is not strong enough in regard to be a good mission statement; therefore, we have further developed a more comprehensive mission statement below. ââ¬Å"To be the leading role of pork chop bun market not only in Macau, but also expand the business to South-East Asian countries. As a top family style pork chop bun store, we are determined to reinforce our image by designing our own logo, slogan and brand of Cafe Tai Lei Loi Kei. With the insistence of fresh ingredients used and friendly sentimental service, we are committed to serve high value and quality products to all visitors and local residents at reasonable price. In order to meet the customersââ¬â¢ needs and demand in the rapid changing market, we will continue to develop new technology applying in food production and innovative products. Our dedicated team is also responsive to social community in hiring uneducated local employees as well as contribution in charity activities, in where providing growth opportunity and building a more familiar relationship to employees.â⬠VISION ââ¬Å"We are transforming the original operation pattern to microenterprise, with regional franchise operations not only limited to Macau but also to the South-East Asian market. We believe that an accelerated profit will be kept over the next few years. We will constantly design and launch new menu items in accordance to the local appetite in the market. Our goal is to make a remarkable profit for every branch of Cafà © Tai Lei Loi Kei and fulfill every customerââ¬â¢s expectation.â⬠STRATEGY FORMULATION i.External Factor Evaluation Matrix (EFE) Cafà © Tai Lei Loi Kei ââ¬â Key External Factors OpportunitiesWeightRatingWeighted Score Increase number of tourists coming to Macau0.1530.45 Better economy in South East Asia and Mainland China0.1030.30 Increase in Macau peopleââ¬â¢s purchasing power0.1030.30 Promotion coupons attached in Macauââ¬â¢s official tourist map may help increase awareness0.0520.10 Cooperation with the youth correctional institution may help finding manpower0.0530.15 Threats Customers are easy to change another brand to consume pork chop bun0.1020.20 Increasing number of competitors in the town selling similar product0.1510.15 Increasing amount of rent in Macau may lead Tai Lei suffer0.0520.10 Local people refuse to work in small-middle enterprises0.0520.10 Negative comments from online reviews and locals0.0520.10 Negative news in Taipaââ¬â¢s flagship store in December 2011 (required to close by IACM)0.0530.15 People seek for healthier food and beverage nowadays0.1020.20 TOTAL1.002.30 Cafà © Tai Lei Loi Kei has a total weighted score of 2.30 revealing that the company is below average in its performance to implement strategies that capitalize on external opportunities and avoid threats. ii.Internal Factor Evaluation Matrix (IFE) Cafà © Tai Lei Loi Kei ââ¬â Key Internal Factors Strengths WeightRatingWeighted Score Old history and reputable brand name0.1040.40 Use central manufactory to produce pork chop to ensure same quality and acquired ISO recognition0.0530.15 Earning profit every year0.1540.60 Attractiveness to investors from South East Asia and Mainland China0.1540.60 Strong marketing team to develop new promotional programs and expansion strategies0.1030.30 Weaknesses Low educational level of all level of the employee0.0520.10 Lack of manpower0.1010.10 High selling price compares to similar products in the market0.1520.30 Limited amount of branches in Macau Peninsula0.0530.15 Most products are in high calories 0.1020.20 TOTAL1.002.90 Cafà © Tai Lei Loi Kei has a total weighted score of 2.90 indicating that the company is above average in its effort to implement strategies that utilize on internal strengths and minimize weaknesses. iii.Competitive Profile Matrix (CPM) Two core competitors are identified in accordance to geographic location, product, quality and price. Cafà © E.S.KIMO is the first Taiwanese coffee shop in Macau (MGTO, 2012), with the immersion of local favors. It also provide famous pork chop bun with a very nice unit price of MOP 13. It has many branches across the town as well as mainland China. In the Taipa branch which just located opposite to Cafà © Tai Lei Loi Kei, it placed an easy-up banner (see picture 1) outside of the store showing that ââ¬Å"Macauââ¬â¢s famous pork chop bun only sells MOP 13â⬠(see picture 2). Another competitor is ââ¬Å"Taipaââ¬â¢s famous pork chop bunâ⬠(named Taipa pork chop bun below) located in Rua do Cunha, which also selling pork chop bun with unit price of MOP 23 and Kopi Luwak (a kind of high quality coffee). Cafà © Tai Lei Loi KeiCafà © E.S.KIMOTaipa Pork Chop Bun Critical Success FactorsWeightRatingScoreRatingScoreRatingScore Advertising0.1020.2030.3010.10 Food Quality0.1530.4530.4520.30 Dietary Consideration0.1020.2030.3020.20 Service Quality0.1030.3030.3020.20 Price Competitiveness0.1020.2040.4020.20 Management0.0330.0930.0920.06 Financial Position0.0530.1530.1520.10 Customer Loyalty0.0520.1040.2010.05 Reputation0.0540.2040.2020.10 Global Expansion0.1520.3030.4510.15 Market Share0.0530.1540.2020.10 Accessibility0.0330.0940.1210.03 Atmosphere of Restaurant0.0420.0840.1620.08 Total1.002.513.321.67 According to the result of CPM, it shows that Cafà © Tai Lei Loi Kei has a total weighted score of 2.51 which is just above average. Comparing to the other two core competitors, the company is situated in the middle; while Cafà © E.S.KIMO is performing the best among them. iv.Strategic Position Action Evaluation Matrix (SPACE) According to the result of the SPACE Matrix, it showed that the strategic position of Cafà © Tai Lei Loi Kei is aggressive (1, 1.11). The environment is stable, have the strong competitiveness and financial background. The appropriate strategies are backward, forward, horizontal integration, market penetration, market development, product development and diversification. v.SWOT Matrix Strength 1.Old history and reputable brand name 2.Use central manufactory to produce pork chop to ensure same quality and acquired ISO recognition 3.Earning profit every year 4.Attractiveness to investors from South East Asia and Mainland China 5.Strong marketing team to develop new promotional programs and expansion strategiesWeakness 1.Low educational level of all level of the employee 2.Lack of manpower 3.High selling price compares to similar products in the market 4.Limited amount of branches in Macau Peninsula 5.Most products are in high calories Opportunities 1.Increase number of tourists coming to Macau 2.Better economy in South East Asia and Mainland China 3.Increase in Macau peopleââ¬â¢s purchasing power 4.Promotion coupons attached in Macauââ¬â¢s official tourist map may help increase awareness 5.Cooperation with the youth correctional institution may help finding manpowerS1, S4, S5, O2 Expand the business to South East Asia and Mainland China S1, O1, O2, O3 Put more efforts on the advertisement and promotion in existing market Threat 1.Customers are easy to change another brand to consume pork chop bun 2.Increasing number of competitors in the town selling similar product 3.Increasing amount of rent in Macau may lead Tai Lei suffer 4.Local people refuse to work in small-middle enterprises 5.Negative comments from online reviews and locals 6.Negative news in Taipaââ¬â¢s flagship store in December 2011 (required to close by IACM) 7.People seek for healthier food and beverage nowadays-W3, T3 ââ¬â Acquire supplier company to lower the cost W5, T7 Develop healthier product to capture the market share of the ââ¬Å"healthy followersâ⬠i.Acquire supplier company According to the W3 and T3, it shows that Cafà © Tai Lei Loi Kei is suffering the very high rent in Macau, especially the shop located in the Taipa old town which costs them almost MOP 150,000 per month. Furthermore, Tai Lei has set the selling price in a high level comparing with other similar products in the market in order to balance their financial statement. However, it does not help with the cost issue. We suggest that backward integration strategy would be suitable for them. Cafà © Tai Lei Loi Kei has already taken care of their distribution; therefore, they can acquire some of the supplier companies such as the company which provides bread and pork chop. With the implementation of this strategy, they can have better control in the cost of their business and they might lower the price to attract more customers. ii.Develop healthier product Nowadays, people concern their health more than before. The trend of the current environment is tent to buy healthy and green products and company always promotes well-being. However, the products of Cafà © Tai Lei Loi Kei are high calories and fats and itââ¬â¢s not what the current market looks for. According to the W5 and T7, it indicated the need to develop healthier food. For example, Tai Lei can invest a new product which claims at healthiness, such as using organic vegetables, low fat milk, vegetable oil, etc. iii.Expand the business to South East Asia and Mainland China According to the strength 1, 4, 5 and opportunity 2 and the concept of the market development, it discloses that Cafà © Tai Lei Loi Kei have a strong power to expand their business out of Macau. They are successful and have a long history of their business and have already accumulated a well reputation. In addition, they are famous to the South East Asia and Mainland China. Itââ¬â¢s attractiveness to the investors from those countries to invest a new business in there. Moreover, the economy of South East Asia and Mainland China are doing well nowadays, itââ¬â¢s one of the motivators that Tai Lei should expand their business to the two markets. iv.Put more efforts on the advertisement and promotion in existing market In strength 1 and opportunity 1, 2, 3, we suggest Tai Lei can create a new strategy with application of market penetration. Tai Lei owns two branches in Hong Kong and three in Macau. Hong Kong and Macau are popular tourism cities in the world, especially Macau; the number of tourists coming to Macau is increasing rapidly. Moreover, according to the opportunity 2, there is better economy in South East Asia and Mainland China, and the main tourists of Hong Kong and Macau are come from those countries. Advertisement and promotion can help to introduce Tai Lei to those tourists before the company enters to these two new markets. For example, using celebrities to promote the brand and product or distribute coupons via different channels. If Tai Lei put more efforts to do the advertisement and promotion in Hong Kong and Macau, it can attract more consumers and increase the market share. vi.Quantitative Strategic Planning Matrix (QSPM) A QSPM for Cafà © de Tai Lei Loi Kei Acquire supplier companyPut more efforts on the advertisement and promotion in exiting marketExpand the business to South East Asia and Mainland ChinaDevelop healthier product External FactorWeightASTASASTASASTASASTAS Opportunities 1.Increase number of tourists coming to Macau0.1510.1540.6020.3030.45 2.Better economy in Southeast Asia and Mainland China0.1010.1030.3040.4020.20 3.Increase in Macau peopleââ¬â¢s purchasing power0.1020.2030.3010.1040.40 4.Promotion coupons attached in Macauââ¬â¢s official tourist map may help increase awareness0.0530.1540.2000.0030.15 5.Cooperation with the youth correctional institution may help finding manpower0.05-ãâ¬â¬-ãâ¬â¬-ãâ¬â¬-ãâ¬â¬-ãâ¬â¬-ãâ¬â¬-ãâ¬â¬-ãâ¬â¬ Threat 1.Customers are easy to change another brand to consume pork chop bun0.1020.2040.4010.1030.30 2.Increasing number of competitors in the town selling similar product0.1520.3040.6010.1530.45 3.Increasing amount of rent in Macau may lead Tai Lei suffer0.05-ãâ¬â¬Ã£â¬â¬-ãâ¬â¬Ã£â¬â¬-ãâ¬â¬-ãâ¬â¬ 4.Local people refuse to work in small-middle enterprises0.05-ãâ¬â¬-ãâ¬â¬-ãâ¬â¬Ã£â¬â¬Ã£â¬â¬ 5.Negative comments from online reviews and locals0.0510.0540.2030.1520.10 6.Negative news in Taipaââ¬â¢s flagship store in December 2011 (required to close by IACM)0.0510.0540.2020.1030.15 7.People seek for healthier food and beverage nowadays0.1010.1020.2030.3040.40 Sub Total1.00ãâ¬â¬1.30ãâ¬â¬3.00ãâ¬â¬1.60ãâ¬â¬2.60 Internal FactorWeightASTASASTASASTASASTAS Strengths 1.Old history and reputable brand name0.1010.1040.4030.3020.20 2.Use central manufactory to produce pork chop to ensure same quality and acquired ISO recognition0.05-ãâ¬â¬Ã£â¬â¬Ã£â¬â¬Ã£â¬â¬-ãâ¬â¬-ãâ¬â¬-ãâ¬â¬ 3.Earning profit every year0.1510.1530.4540.6020.30 4.Attractiveness to investors from South East Asia and Mainland China0.1510.1530.4540.6020.30 5.Strong marketing team to develop new promotional programs and expansion strategies0.1010.1040.4030.3020.20 Weakness 1.Low educational level of all level of the employee0.05-ãâ¬â¬-ãâ¬â¬-ãâ¬â¬-ãâ¬â¬-ãâ¬â¬-ãâ¬â¬-ãâ¬â¬-ãâ¬â¬ 2.Lack of manpower0.10ãâ¬â¬-ãâ¬â¬Ã£â¬â¬-ãâ¬â¬- 3.High selling price compares to similar products in the market0.1540.6020.3010.1530.45 4.Limited amount of branches in Macau Peninsula0.0510.0540.2030.1520.10 5.Most products are in high calories 0.1010.1030.3020.2040.40 Subtotal1.00ãâ¬â¬1.252.50ãâ¬â¬2.301.95 Sub Total Attractiveness Scoreãâ¬â¬Ã£â¬â¬2.555.50ãâ¬â¬3.904.55 As the table of QSPM for Cafà © de Tai Lei Loi Kei show that the left two columns are extracted verbatim from the EFEM and IFEM of Cafe Tai Lei Loi Kei and also note that four alternative strategies ââ¬â 1) Acquire supplier company 2) Develop healthier product 3) Expand the business to South East Asia and Mainland China 4) Put more efforts on the advertisement and promotion in exiting market ââ¬â were from the companyââ¬â¢s SWOT Matrix. Moreover, the Attractiveness Score (AS) from1 to 4 is used to reveal each strategyââ¬â¢s attractiveness given the respective external or internal factor, where 4 is the best and 1 is the least attractive. Work row by row in developing the QSPM and decide which strategy is the best for the external or internal factor. After conducted the QSPM, the strategy of ââ¬Å"Put more efforts on the advertisement and promotion in exiting marketâ⬠was highly recommended based on the result of the sum total of the Attractiveness Score from QSPM and it acquired the highest score of 5.50. The second recommendation strategy is ââ¬Å"Develop healthier productâ⬠and the third one is ââ¬Å"Expand the business to South East Asia and Mainland Chinaâ⬠due the priority of the Attractiveness Score, which is 4.55 and 3.90. QSPM can be important information for a firm to make decision of strategies. The strategy of the Attractiveness Score below 3 in the QSPM is not taken into the consideration. The reason of chosen ââ¬Å"Put more efforts on the advertisement and promotion in exiting marketâ⬠as the highly recommend strategy, the Attractiveness Score of this strategy in the sector of external factor, there are twoà opportunities are rated as 4 and two rated as 3 reflecting that the strategy was attractive enough to fulfill those opportunities and one of the opportunities is not related; those opportunities are related to the market trends ââ¬â the chance for increasing sales because the tourists, especially the South East Asian and Mainland China tourists, are flooding to Macau tourism market and the booming economy increase the spending ability of local people as well. In addition, two threats about the competitors become more and more because of the opportunities that they can gain the market share of pork chop bun, besides; two threats related to lots of negative comments, news are appeared on the internet, newspaper and magazine. Therefore, a strategy of ââ¬Å"Put more efforts on the advertisement and promotion in exiting marketâ⬠got the highest score on Attractiveness Score because it can against this situation by create more promotional advertisements and distributed by mass media in order to capture the largest amount of pork chop bun market share, by the way; this strategy can break the negative comments and news as well. The remaining one about the shortage of man power in Macau cannot solve by the firm themselves due to the government policy. On the other hand, in the internal factor, two strengths are rated as 4 and two strengths are rated as 3 to show that Cafe Tai Lei Loi Kei has the ancient and reputation brand name, the ISO recognition and the new hire marketing team so it is attractive enough to get the attention of investors all over the world, besides they had good financial report on earn profit per year. Thus, ââ¬Å"Put more efforts on the advertisement and promotion in existing marketâ⬠can be chosen as a tool to attract more investors so as to expand the pork chop bun market by the promotional advertisement about the ancient and reputation brand name and cooperate with the new hire marketing team, the expanding no longer focus on Macao but Southeast Asia. And one strength does not have any relationship of this strategy. Moreover, one of the weaknesses is rated as 2 and one is rated as 4 related to higher price and do not have enough branches in Macau, so the promotional poster or promote in the travel guide book to emphasis the ancient brand name with ââ¬Å"where to buy instruction that can be a good solution to against the weaknesses which already excited in Tai Lei, furthermore; one of the weaknesses is rated as 3 for the less of healthier food, thus first at all, Tai Lei prove some health product then use ââ¬Å"Putà more efforts on the advertisement and promotion in existing marketâ⬠to do more promotion of the related product. And the other weaknesses are no impacted on this strategy. STRATEGY IMPLEMENTATION i.Acquire supplier company Acquisition is one of the backward integration methods. Cafà © Tai Lei Loi Kei could acquire suppliers such as the pork chop and bread suppliers, etc. This benefits Tai Lei because it eliminates the profit which normal suppliers get from Tai Lei, causing reduction of cost. Upon the acquisition, Cafà © Tai Lei Loi Kei may have to keep all the original staff of the suppliers. However, the organizational culture of the two firms may be different so it becomes difficult for Tai Lei to persuade all staff to have full commitment to the Cafà ©. Remuneration package have to been discussed again in order to retain all experienced staff. ii.Develop healthier product Inventing and creating new flavor products will be a way for Cafà © Tai Lei Loi Kei to survive in the keen competition. Customers are always looking for new products and innovations, especially some healthy food. After the launch of new products, it takes Tai Lei a long period of time to test the market response and to see whether the customers accept the new products or not. Cafà © Tai Lei Loi Kei will definitely bear the risk that the new products do not help them to expand the product line and obtain good response from customers. iii.Expand the business to South East Asia and Mainland China It costs Cafà © Tai Lei Loi Kei a lot to expand a new market, such as some South East Asian countries. They have to spend a lot on marketing campaigns and promotion methods. Tai Lei has to tolerate the heavy marketing expenses and at the same time, bear the risk that the customers from new market do not accept this kind of new products. The marketing strategies with high cost will affect Cafà © Tai Lei Loi Keiââ¬â¢s profit. iv.Put more efforts on the advertisement and promotion in existing market By applying the same concept with the expansion of new market in South East Asian countries, Cafà © Tai Lei Loi Kei has to spend a lot to emphasis more on the marketing effort within the existing markets, Macau and Hong Kong. It will be beneficial for them to focus more on the existing market since it is easier to retain customers rather than attracting new customers. However, the high marketing cost decreases Tai Leiââ¬â¢s revenue at the same time. CONCLUSION Cafà © Tai Lei Loi Kei is a local brand with long history, selling its superior pork chop bun to delight customers with most efforts. According to the interview result and data, we created a brand new vision and mission for Tai Lei. Those interview result includes its internal strengths and weaknesses, external opportunities and threats and many other factors which may affect the future development and performance of Tai Lei. A number of matrixes have been conducted to better analysis the current situation of Tai Lei. After all the matrixes analysis, four strategies have been developed. We suggest Cafà © Tai Lei Loi Kei to adopt these four strategies, in order to further develop and expand its own business and have a more prosperous future.
Wednesday, October 2, 2019
Cryptography: Theories, Functions and Strategies
Cryptography: Theories, Functions and Strategies Abstract Digital signing is a mechanism for certifying the origin and the integrity of electronically transmitted information. In the process of digitally signing, additional information called a digital signature is added to the given document, calculated using the contents of the document and some private key. At a later stage, this information can be used to check the origin of the signed document. The mathematical base of the digital signing of documents is public key cryptography. This work presents the theory behind digital signatures, signature schemes and attacks on signatures and provides a survey of application areas of the digital signing technology. Moreover, there are lab exercises developed in Mathlab, to reinforce the understanding of this technology. 1. Introduction The Concise Oxford Dictionary (2006) defines cryptography as the art of writing or solving codes, however modern cryptography does not met this definition. Therefore, this work starts with a literature review defining some key concepts, like what cryptography and cryptographic system are and the different types of cryptographic system are presented. The other interesting and preliminary concept is the notion of cryptosystem functions which are also discussed in the introductory section. Furthermore, it is stated that public-key encryption represents a revolution in the field of cryptography, and this work poses some basic definitions on this topic trying to explain the theory behind. The rest of the literature review is concentrated on public key cryptography and it focuses on the theory behind digital signatures, signature schemes and attacks on signatures. And finally, the literature review presents a survey of application areas on digital signatures. One part of the contribution of this work, is an overview of the secure hash standard (SHS) and implementation of the secure hash algorithm (SHA-1), required for use with digital signature algorithms. The main part though, is the implementation of AES and RSA by utilizing Mathlab. The code of all these implementations is thoroughly discussed and explained in this work. Moreover, a comparison is also presented subsequently. 2. Cryptography The Greek words ââ¬Å"kryptà ´osâ⬠standing for ââ¬Å"hiddenâ⬠and the word ââ¬Å"là ´ogosâ⬠that means ââ¬Å"wordâ⬠, are in essence the base from where the word cryptology was derived. As these words denote, cryptology can be best explained by the meaning ââ¬Å"hidden wordâ⬠. In this context, the original purpose behind cryptology is hiding the meaning of some specific combination of words which in turn would insure secrecy and confidentiality. This is a very limited viewpoint in todayââ¬â¢s perspective and a wide range of security applications and issues now come under the term of cryptology (rest of the portion of this section will clarify this point of view). As field of mathematical science, Cryptology includes the study of both cryptanalysis as well as cryptography. On one hand, cryptography is a very broad term and represents any process used for data protection. On the other hand, the study of security related issues and the probabilities of breaking the cryptographic systems and a technique is known as cryptanalysis. By making reference to (Shirey, 2000), the field cryptanalysis can be best described as the ââ¬Å"mathematical science that deals with analysis of a cryptographic system in order to gain knowledge needed to break or circumvent the protection that the system is designed to provide.â⬠In simple words, cryptanalyst can be regarded as the opponent of the cryptographer i.e. he/she has to get around the security which cryptographer devised on his/her part. (Buchmann, 2004) claims that a cryptographic system (or in short a cryptosystem) describes ââ¬Å"a set of cryptographic algorithms together with the key management processes that support use of the algorithms in some application context.â⬠This is a diverse explanation that includes all sorts of cryptographic algorithms as well as protocols. However, hidden parameters like cryptographic keys may or may not be used by a cryptographic system (Delfs, 2007). Similarly, participants of the undergoing communication may or may not share those secret parameters. Thus, cryptographic can be classified into following three types: a cryptographic system in which no secret parameters are employed (called an un-keyed cryptosystem); a cryptosystem which makes use of secret parameters and at the same time shares the parameters between the participants (known as a secret key cryptographic system); and a system that utilizes the secret parameters, but not sharing them with the participants (call ed a public key cryptographic system) (Shirey, 2000; Buchmann, 2004). Cryptography aims at designing and implementing cryptographic systems and utilizing such systems which are secure effectively. The first a formal definition about the term cryptography dates from relatively past time. Back then, the approach known by the name ââ¬Å"security through obscurityâ⬠was being used (Dent, 2004). There are a lot of examples based on this approach by which security of the system was improved by keeping internal working and design secret. Majority of those systems do not serve the purpose and security may well be violated. The Kerckhoffsââ¬â¢ principle is a very famous cryptographic principle which states that (Kerckhoffs, 1883): ââ¬Å"Except for parameters clearly defined to be secret, like the cryptographic keys, a cryptosystem must be designed in such a way as to be secure even with the case that the antagonist knows all details about the systemâ⬠. However, it might be noted that one important aspect is that a cryptosystem is perfectly securing theoretically grounds, but it may not remain the same when implemented practically. Different possibilities of generating attacks on security of such systems can arise while having the practical implementation (Anderson, 1994). Attacks which make use of exploitation of side channel information are the examples of such attacks. If a cryptosystem is executed, it can result in the retrieval of side channel information with unspecified inputs and outputs (Anderson, 1994). In encryption systems, the input is plaintext message plus the key, while the specific output is the cipher text. Thus, there are chances on information leakage. Power consumption, timing characteristics along with the radiation of all types are some examples in this regard. On the other hand, side channel attacks are the types of network attacks which extract side channel information. Since the mid 1990s there were many di fferent possibilities have been found by the researchers in order to build up side channel attacks. A few examples in this regard are the differential power analysis (Bonehl, 1997), and fault analysis (Biham, 1997; Kocher, 1999) as well as the timing attacks (Kocher, 1996). It is a very practical statement that any computation performed on real computer systems represents some physical phenomena which can be examined and analyzed to provide information regarding the keying material being employed. Cryptography does not help to cope with this situation because of the inherent nature of this problem. 2.1 Cryptosystem functions Other than the usual random bit generators as well as the hash functions, there are no secret parameters that are used in cryptosystem functions. These are the junketed functions that characterize the cryptographic system functions. In cryptographic functions, the elements used are usually one-way and it is difficult or almost impossible to invert them. This follows that it is easy to compute a cryptographic function whereas it is hard to invert the functions and also to compute the results of the relationships (Kerckhoffs, 1883). It is difficult to apply any mathematical method for inverting the cryptographic system functions in a way that will be coherent and meaningful. For example, a cryptographic system functions such as F: X ââ â Y is easy to comfortably use mathematical knowledge to compute while it is hard to use the same to invert (Buchmann, 2004; Shirey, 2000). There are many examples of one-way functions that we can use to demonstrate the meaning of the cryptosystems. In a situation where one has stored numbers on the cell phone, computation of the same is possible and easy due to the fact that the names are stored in an alphabetical manner (Garrett, 2001). If one inverts the relationship of these functions, it will be impossible to compute because the numbers are not arranged numerically in the storage phonebook. It is notable that a lot of other things that we do in daily life are comparable to cryptosystem function in the sense that you cannot invert or undo them. For example, if one breaks a glass, the process is one way because it is not possible for these pieces to be restored together again (Goldreich, 2004). Similarly, when one drops something into water, it is not practically possible to reverse the action of dropping this item (Mao, 2003). The English corresponding action would be to un-drop the item as opposed to picking it. Cry ptosystem functions cannot be demonstrated as purely one-way and this is the branching point between cryptosystem functions and the real world of things and circumstances. The only one-way functions in mathematics can be exemplified by discrete exponentiation, modular power and modular square functions. Public key cryptography uses these functions in its operations but it has not been well documented whether they are really one-way or not. There has been debate in practice whether one-way functions really exist in the first place or not (Garrett, 2001). In the recent day cryptographic discussions a lot of care should be applied when referring to the one-way functions so as not to interfere or make false claims to the functional attributes of these parameters. There is a need to look for extra information and knowledge concerning one-way functions so that efficient and meaningful inversions are possible and mathematically coherent. Therefore, functions such as F: X ââ â Y is considered to be a one-way function (Koblitz, 1994; Schneier, 1996). This follows that if F can successfully and coherently inverted, the need for extra information is needed. This will hence bring the notion of the meaning of the other parameters in relation to F. Computer science uses the hash functions in its operations. This is because these functions are computable and generates output dependent on the input that was used (Katz, 2007; Koblitz, 1994). 3. Digital signatures The public-key encryption presents a revolution in the field of cryptography and until its invention the cryptographers had relied completely on common, secret keys in order to achieve confidential communication (Smart, 2003). On the contrary, the public-key techniques, allow for the parties to communicate privately without the requirement to decide on a secret key in advance. While the concept of private-key cryptography is presented as two parties agree on a secret keyk which can be used (by either party) for both encryption and decryption; public-key encryption is asymmetric in both these respects (Stinson, 2005). Namely, in public-key encryption: One party (the receiver) generates a pair of keys (pk, sk), where pk is called the public key and ps is the private key, The public key is used by a sender to encrypt a message for the receiver, and The receiver uses the private key to decrypt that message. There three parts of information form part of public key certificate: Some naming information A Public key Digital signatures (this can be one or more) Encryptions and digital signatures were introduced to make the web transactions secure and manageable. The use of cryptographic techniques was applied to enhance and provide security layer such that the encrypted information and files would remain secure and confidential. Very frequently, a digital signature is mistaken with the inverse of a public-key encryption, but this is not entirely true. In the history, a digital signature could be obtained by reversing, but today in the majority of the situations this process would be impossible to be performed. Basically, a digital signature is a form of a mathematical scheme for signifying the genuineness of a digital message. A valid digital signature would provide a proof to the person that receives the message or the document that these information is indeed created by a specified sender. Moreover, it would prove that message or the document was not altered during the transportation. Digital signatures are usually used for software distribution or mainly money transactions, where it is very important to detect the possibility of forgery. As a part of the field in asymmetric cryptography, it might be noted that a digital signature is somehow equivalent of the traditional handwritten signatures. On the other hand, in order to be effective, a digital signature should be correctly implemented. Another very important concept is the notion of non-repudiation. This means that if somebody signs a document by using a digital signature, they can not say that it was not signed by them, even though their private key remains as a secret. On the other hand, there is a time stamp, so that even if the private key of a sender is compromised in future, the digital signature will remain valid. Examples of such messages are: electronic mail contracts messages sent via some cryptographic protocol A digital signature usually is comprised of: An algorithm for producing a key. This algorithm would find a private key by chance from all the possible private keys available. Then it will output that private key with a matching public key. A signing algorithm that, given a message and a private key, produces a signature. A signature authenticating algorithm that, given a message, public key and a signature, it will accept or reject the message. Primary, a signature produced from a fixed message and a private key verifies that the genuineness of that message is ok, by means of the matching public key. Then, it has to be computationally infeasible to make an appropriate signature for a party that doesnââ¬â¢t have the private key 4. Algorithms 4.1. Introduction to SHS This section provides an overview of the secure hash standard (SHS) and implementation of the secure hash algorithm (SHA-1), required for use with digital signature algorithms. SHA-1 is used for computing a compressed version of a message or a data file. If that data has a length smaller than 264 buts, then the output will be 160-bit and is called a message digest. The message digest used for an input to the Digital Signature Algorithm (DSA). This algorithm will verify the signature for the message. Signing the message digest instead of the originall message itself, might advance the effectiveness of the procedure. This is since the message digest is usually much slighter in size than the original message. Very important is that the same hash algorithm should be used by both the verifier and the digital signature creator. The usage of the SHA-1 with the DSA can be presented as follows: Interesting for SHA-1 is that it is computationally impossible to discover a message which matchs to a given digest. Moreover, it is also impossible to find two dissimilar messages which create an identical message digest. 4.2. Implementation of SHA-1 The following functions were implemented for the SHA-1 algorithm: Name of source file: secure_hash_algorithm.m. Function in the source file: secure_hash_algorithm (message). This function takes an input a string of characters. Example: Hello, How are you? How is it going on? Output is the message digest, the hash value of the message. Thus, the hash value of the above message is F418F52AE6DC208599F91191E6C40FA876F33754. Name of source file: arithematic_shift_operations.m. Function in the source file: arithematic_shift_operations (number, position, op). The inputs are: number: it is a hexadecimal large number of any size. The number is represented in base 16 and is stored as a string. Ex: ââ¬ËFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFââ¬â¢ position: the number of positions to be shifted by. It is a decimal number in base 10. Op: it is the type of operation done. Inputs are ââ¬ËSRAââ¬â¢ -> shift right arithematic and ââ¬ËSLAââ¬â¢ -> shift left arithematic. For example, the function: arithematic_shift_operations(ââ¬ËFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFââ¬â¢, 3, ââ¬ËSRAââ¬â¢) would return ââ¬Ë1FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFââ¬â¢, and arithematic_shift_operations(ââ¬ËFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFââ¬â¢, 3, ââ¬ËSLAââ¬â¢) would return ââ¬ËFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF8ââ¬â¢. Name of source file: bi2hex.m. Function in the source file: bi2hex (number). The input to this function is a vector of ones and zeros and the result is a hexadecimal output represented in string. For example, for the input ââ¬Å"Number = [1 1 1 1]â⬠bi2hex (Number) returns ââ¬ËFââ¬â¢ and for ââ¬Å"Number = [1 1 1 1 0 0 0 1 ]â⬠bi2hex (Number) returns ââ¬ËF1ââ¬â¢. Name of source file: hex2bi.m. Function in the source file: hex2bi (number). The input to this function is a number stored in form of a string in base 16 and the result is a vector containing the binary representation of input string. For example, for the input ââ¬Å"Number = ââ¬ËFââ¬â¢ â⬠, hex2bi (Number) returns ââ¬Å"[1 1 1 1]â⬠and for ââ¬Å"Number = ââ¬ËF1ââ¬â¢ ââ¬Å", bi2hex (Number) returns ââ¬Å"[1 1 1 1 0 0 0 1]â⬠. Name of source file: hexadecimal_big_number_adder.m. Function in the source file: hexadecimal_big_number_adder (number_one, number_two). The inputs to this function are numbers stored in hexadecimal string format. Output is the result, a hexadecimal string and carry, a decimal number. After using this function, it has to be checked if the carry is generated, Incase if it is generated then the carry has to be appended in the beginning to the result. For example: Number_one = ââ¬ËFFFFFFFFââ¬â¢ Number_two = ââ¬ËEEEEEEEEââ¬â¢ [result, carry] = hexadecimal_big_number_adder (Number_one, Number_two) Result = ââ¬ËEEEEEEEDââ¬â¢ , carry = 1; Hence the real sum is Result = strcat(dec2hex(0), Result); this results to ââ¬Ë1EEEEEEEDââ¬â¢ Name of source file: hexadecimal_big_number_subtractor.m. Function in the source file: hexadecimal_big_number_subtractor(number_one, number_two). The inputs to this function are numbers stored in hexadecimal string format. Output is the result, a hexadecimal string and sign, a decimal number. If sign is -1, then the result generated is a negative number else is a positive number. . For example: Number_one= ââ¬ËEEEEEEEEââ¬â¢ Number_two= ââ¬ËFFFFFFFFââ¬â¢ [result, sign] = hexadecimal_big_number_subtractor(Number_one, Number_two) Result = ââ¬Ë11111111ââ¬â¢ Sign = -1. Name of source file: hexadecimal_big_number_multiprecision_multiplication.m. Function in the source file: hexadecimal_big_number_multiprecision_multiplication(multiplicand, multiplier). The input is a multiplicand stored in string format is a hexadecimal number. And so is multiplier. The output is a result and is stored in form of a string. For example: multiplicand= ââ¬ËEEEEEEEEââ¬â¢ multiplier= ââ¬ËFFFFFFFFââ¬â¢ hexadecimal_big_number_multiprecision_multiplication(multiplicand, multiplier) result is ââ¬ËEEEEEEED11111112ââ¬â¢ Name of source file: comparision_of.m. Function in the source file: comparision_of(number_one, number_two, index). This function compares two numbers in hexadecimal format stored in form of strings. Always input index as decimal 1. Therefore, it: Returns 1 if Number_one > Number_two, Returns 0 if Number_one = Number_two, and Returns -1 if Number_one For example, if Number_one= ââ¬ËEEEEEEEEââ¬â¢ Number_two= ââ¬ËFFFFFFFFââ¬â¢, the result would be: comparision_of(Number_one, Number_two, 1) returns -1. Name of source file: hexadecimal_big_number_modular_exponentiation.m. Function in the source file: hexadecimal_big_number_modular_exponentiation (base, exponent, modulus). This function calculates (power(base, exponent) % modulus). Here the input base, exponent and modulus are hexadecimal strings of any size. For example: Base = ââ¬ËFFFââ¬â¢ Exponent = ââ¬ËEEEââ¬â¢ Modulus = ââ¬ËAAAAââ¬â¢ hexadecimal_big_number_modular_exponentiation (Base, Exponent, Modulus) returns ââ¬Ë8BABââ¬â¢ Name of source file: hexadecimal_big_number_multiplicative_inverse.m. Function in the source file: Z = hexadecimal_big_number_multiplicative_inverse(number_one, number_two). This function returns multiplicative inverse of number_two modulo number_one. If az = 1 (mod m) then z is the multiplicative inverse of a mod m. Here ââ¬Å"number_one = mâ⬠, ââ¬Å"number_two = aâ⬠, ââ¬Å"number_one = ââ¬ËFFFFââ¬â¢ â⬠, ââ¬Å"number_two = ââ¬Ë1235ââ¬â¢ ââ¬Å" andresult is ââ¬Ë634Dââ¬â¢, which in turn is the multiplicative inverse of number_two.Hence : (result * number_two) mod number_one = 1 Name of source file: hexadecimal_big_number_test_for_primality.m. Function in the source file: hexadecimal_big_number_test_for_primality(number). The input to this function is an ODD number stored in hexadecimal format as a string. This function returns 1 if the input is a prime and returns -1 if input is composite. Name of source file: power_of_two_conversion_to_hexadecimal.m. Function in the source file: power_of_two_conversion_to_hexadecimal(power). The input is the number, the power to which two has to be raised to. It is a decimal number and the output is a hexadecimal number in form of string. For example, power_of_two_conversion_to_hexadecimal(4) returns ââ¬Ë10ââ¬â¢ i.e 16 in decimal system. Name of source file: hexadecimal_big_number_division.m. Function in the source file: hexadecimal_big_number_division (dividend, divisor). This function returns quotient and remainder both in hexadecimal string format. The inputs to this function are strings of hexadecimal format. This function uses other two functions in turn which are defined in source file Get_multiplier.m, multiplication_by_single_digit_multiplier.m. Name of source file: remove_leading_zeros.m. Function in the source file: remove_leading_zeros (number). This function takes number in hexadecimal string format as input and removes the leading zeros in the string and returns it. For example, if ââ¬Å"Number = ââ¬Ë000000012345ââ¬â¢ ââ¬Å", then the function returns ââ¬Ë12345ââ¬â¢. Some of the most prominent functions are presented in Appendix A. 4.3. Introduction to MD5 The MD5 Message-Digest Algorithm is a extensively utilised in cryptographic hash functions. Basically this is the case for cryptographic hash functions with a 128-bit (16-byte) hash value. MD5 is used in many security applications, and in addition it is frequently used to check data integrity. An MD5 hash is typically expressed as a 32-digit hexadecimal number. The following figure represents a schematic view of the MD5 Message-Digest Algorithm. 4.4. Implementation of MD5 This algorithm would compute MD5 hash function for files. For example, if as input is given the d = md5(FileName), then the function md5() will computes the MD5 hash function of the file specified in the string FileName. This function will returns it as a 64-character array dwhere d is the digest. The following methodology that the MD5 algorithm was implemented: Initially, the function Digestis called. This function would read the whole file, and will make it uint32 vector FileName = C:\md5InputFile.txt [Message,nBits] = readmessagefromfile(FileName); Then, it would append a bit in the last one that was read from that file: BytesInLastInt = mod(nBits,32)/8; if BytesInLastInt Message(end) = bitset(Message(end),BytesInLastInt*8+8); else Message = [Message; uint32(128)]; end Consequetly, it will append the zeros: nZeros = 16 mod(numel(Message)+2,16); Message = [Message; zeros(nZeros,1,uint32)]; And a bit length of the original message as uint64, such as the lower significant uint32 first: Lower32 = uint32(nBits); Upper32 = uint32(bitshift(uint64(nBits),-32)); Message = [Message; Lower32; Upper32]; The 64-element transformation array is: T = uint32(fix(4294967296*abs(sin(1:64)))); The 64-element array of number of bits for circular left shift: S = repmat([7 12 17 22; 5 9 14 20; 4 11 16 23; 6 10 15 21].,4,1); S = S(:).; Finally, the 64-element array of indices into X can be presented as: idxX = [0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 1 6 11 0 5 10 15 4 9 14 3 8 13 2 7 12 5 8 11 14 1 4 7 10 13 0 3 6 9 12 15 2 0 7 14 5 12 3 10 1 8 15 6 13 4 11 2 9] + 1; The initial state of the buffer is consisting of A, B, C and D. such as: A = uint32(hex2dec(67452301)); B = uint32(hex2dec(efcdab89)); C = uint32(hex2dec(98badcfe)); D = uint32(hex2dec(10325476)); The message is reshaped, such as: Message = reshape(Message,16,[]); The look between the blocks, such that X is an extraction of the next block: for iBlock = 1:size(Message,2) X = Message(:,iBlock); The buffer states are stored as: AA = A; BB = B; CC = C; DD = D; The buffer is transformed by utilizing the X block from above, and the parameters from S, T and idxX k = 0; for iRound = 1:4 for q = 1:4 A = Fun(iRound,A,B,C,D,X(idxX(k+1)),S(k+1),T(k+1)); D = Fun(iRound,D,A,B,C,X(idxX(k+2)),S(k+2),T(k+2)); C = Fun(iRound,C,D,A,B,X(idxX(k+3)),S(k+3),T(k+3)); B = Fun(iRound,B,C,D,A,X(idxX(k+4)),S(k+4),T(k+4)); k = k + 4; end end The old buffer state is also being added: A = bitadd32(A,AA); B = bitadd32(B,BB); C = bitadd32(C,CC); D = bitadd32(D,DD); end The message digest is being formed the following way: Str = lower(dec2hex([A;B;C;D])); Str = Str(:,[7 8 5 6 3 4 1 2]).; Digest = Str(:).; The subsequent functionality is performed by the following operations: function y = Fun(iRound,a,b,c,d,x,s,t) switch iRound case 1 q = bitor(bitand(b,c),bitand(bitcmp(b),d)); case 2 q = bitor(bitand(b,d),bitand(c,bitcmp(d))); case 3 q = bitxor(bitxor(b,c),d); case 4 q = bitxor(c,bitor(b,bitcmp(d))); end y = bitadd32(b,rotateleft32(bitadd32(a,q,x,t),s)); And the bits are rotated such as: function y = rotateleft32(x,s) y = bitor(bitshift(x,s),bitshift(x,s-32)); The sum function is presented as: function sum = bitadd32(varargin) sum = varargin{1}; for k = 2:nargin add = varargin{k}; carry = bitand(sum,add); sum = bitxor(sum,add); for q = 1:32 shift = bitshift(carry,1); carry = bitand(shift,sum); sum = bitxor(shift,sum); end end A message is being read frm a file, such as: function [Message,nBits] = readmessagefromfile(FileName) [hFile,ErrMsg] = fopen(FileName,r); error(ErrMsg); Message = fread(hFile,inf,ubit32=>uint32); fclose(hFile); d = dir(FileName); nBits = d.bytes*8; Lastly, the auto test function is the following: function md5autotest disp(Running md5 autotest); Messages{1} = ; Messages{2} = a; Messages{3} = abc; Messages{4} = message digest; Messages{5} = abcdefghijklmnopqrstuvwxyz; Messages{6} = ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789; Messages{7} = char(128:255); CorrectDigests{1} = d41d8cd98f00b204e9800998ecf8427e; CorrectDigests{2} = 0cc175b9c0f1b6a831c399e269772661; CorrectDigests{3} = 900150983cd24fb0d6963f7d28e17f72; CorrectDigests{4} = f96b697d7cb7938d525a2f31aaf161d0; CorrectDigests{5} = c3fcd3d76192e4007dfb496cca67e13b; CorrectDigests{6} = d174ab98d277d9f5a5611c2c9f419d9f; CorrectDigests{7} = 16f404156c0500ac48efa2d3abc5fbcf; TmpFile = tempname; for k=1:numel(Messages) [h,ErrMsg] = fopen(TmpFile,w); error(ErrMsg); fwrite(h,Messages{k},char); fclose(h); Digest = md5(TmpFile); fprintf(%d: %sn,k,Digest); if ~strcmp(Digest,CorrectDigests{k}) error(md5 autotest failed on the following string: %s,Messages{k}); end end delete(TmpFile); disp(md5 autotest passed!); 4.4.1 Results This algorithm is tested with the input: university of Portsmouth department of electronic and computer engineering. This was written on the file: ââ¬Å"C://md5InputFile.txtâ⬠. The outpus results are as in the following fugures: Textual description of the output results follows: OUTPUT FileName = C:\md5InputFile.txt Running md5 autotest FileName = C:\md5InputFile.txt 1986621045 1769173605 1864399220 1867522150 1836282994 1752462703 1885692960 1836348001 544501349 1696622191 1952671084 1768845170 1851859043 1868767332 1953853549 1696625253 1852401518 1769104741 26478 1: 3129b41fa9e7159c2a03ad8c161a7424 FileName = C:\md5InputFile.txt 1986621045 1769173605 1864399220 1867522150 1836282994 1752462703 1885692960 1836348001 544501349 1696622191 1952671084 1768845170 1851859043 1868767332 1953853549 1696625253 1852401518 1769104741 26478 2: 3129b41fa9e7159c2a03ad8c161a7424 FileName = C:\md5InputFile.txt 1986621045 1769173605 1864399220 1867522150 1836282994 1752462703 1885692960 1836348001 544501349 1696622191 1952671084 1768845170 1851859043 1868767332 1953853549 1696625253 1852401518 1769104741 26478 3: 3129b41fa9e7159c2a03ad8c161a7424 FileName = C:\md5InputFile.txt 1986621045 1769173605 1864399220 1867522150 1836282994 1752462703 1885692960 1836348001 544501349 1696622191 1952671084 1768845170 1851859043 1868767332 1953853549 1696625253 1852401518 1769104741 26478 4: 3129b41fa9e7159c2a03ad8c161a7424 FileName = C:\md5InputFile.txt 1986621045 1769173605 1864399220 1867522150 1836282994 1752462703 1885692960 1836348001 544501349 1696622191 1952671084 1768845170 1851859043 1868767332 1953853549 1696625253 1852401518 1769104741 26478 5: 3129b41fa9e7159c2a03ad8c161a7424 FileName = C:\md5InputFile.txt 1986621045 1769173605 1864399220 1867522150 1836282994 1752462703 1885692960 1836348001 544501349 1696622191 1952671084 1768845170 1851859043 1868767332 1953853549 1696625253 1852401518 1769104741 26478 6: 3129b41fa9e7159c2a03ad8c161a7424 FileName = C:\md5InputFile.txt 1986621045 1769173605 1864399220 1867522150 1836282994 1752462703 1885692960 1836348001 544501349 1696622191 1952671084 1768845170 1851859043 1868767332 1953853549 1696625253 1852401518 1769104741 26478 7: 3129b41fa9e7159c2a03ad8c161a7424 md5 autotest passed! 4.5. Introduction to Caesar cipher The Caesar cipher in cryptography, is in essence a shift cipher. It represents as one of the simplest and most widely known encryption methodologies. The Caesar cipher is a kind of substitution cipher. It means that each letter in a given plaintext is replaced by another letter. This is done due shifting by some fixed number of positions down the alphabet. Julius Caesar was the first to use this ci
Long Days Journey into Night Eugene by ONeill - Character Analysis of Mary :: Long Days Journey into Night
Long Day's Journey into Night Eugene by O'Neill - Character Analysis of Mary In the play à ¡Ã °Long Dayà ¡Ã ¯s Journey into Night,à ¡Ã ± by Eugene Oà ¡Ã ¯Neill, the writer depicts a typical day of the Tyrone family, whose once-close family has deteriorated over the years for a number of reasons: Maryà ¡Ã ¯s drug addiction, Tyrone Jamie and Edmundà ¡Ã ¯s alcoholism, Tyroneà ¡Ã ¯s stinginess, and the sons` pessimistic attitude toward future. In the play, all of the four characters are miserable about life, and they all remember the past and try to escape from reality by drinking alcohol or taking drugs. Among these four characters, Mary is a typical and special one; she is the most tragic character in the play. She used to be an innocent girl with beautiful dreams (to become a nun and a pianist) and a strong religious faith centered on the Virgin Mary. However, her marriage destroyed her dreams and weakened her faith. Her husband Tyrone fails to realize the promises he made to Mary, which makes her lose her faith in the marriage. The morphine addi ction drags her down and makes her unconscious about whether she lives in the past or present. The title of the play is a à ¡Ã °Long Dayà ¡Ã ¯s Journey into Nightà ¡Ã ±, but Mary, as she keeps taking morphine, travels mentally back to the past when she has fewer problems and happier life. Thus, for Mary, it is actually a long dayà ¡Ã ¯s journey into the past. In Act One, there are three points that are important to the developing of the character of Mary. One is that she realizes her beauty is fading away, and she is in the stages of decline; another is that she refuses to admit that there is a health problem with her and her son Edmund. Finally, there is the issue of Maryà ¡Ã ¯s specific idea of what a à ¡Ã °homeà ¡Ã ± is. At the beginning of the play, Tyrone and Jamie stare at Mary, and make her self-conscious (p27); they talk about her hair and remember the beautiful hair that Mary had when she was young. Mary realizes that she is getting old and she is very anxious about this, which is reflected when she asks people what is wrong with her hair several times. One of Maryà ¡Ã ¯s central flaws is her refusal to admit that there is a problem with herself or Edmund. She lies to her family many times about being cured, and she blames them for suspecting her. Long Day's Journey into Night Eugene by O'Neill - Character Analysis of Mary :: Long Day's Journey into Night Long Day's Journey into Night Eugene by O'Neill - Character Analysis of Mary In the play à ¡Ã °Long Dayà ¡Ã ¯s Journey into Night,à ¡Ã ± by Eugene Oà ¡Ã ¯Neill, the writer depicts a typical day of the Tyrone family, whose once-close family has deteriorated over the years for a number of reasons: Maryà ¡Ã ¯s drug addiction, Tyrone Jamie and Edmundà ¡Ã ¯s alcoholism, Tyroneà ¡Ã ¯s stinginess, and the sons` pessimistic attitude toward future. In the play, all of the four characters are miserable about life, and they all remember the past and try to escape from reality by drinking alcohol or taking drugs. Among these four characters, Mary is a typical and special one; she is the most tragic character in the play. She used to be an innocent girl with beautiful dreams (to become a nun and a pianist) and a strong religious faith centered on the Virgin Mary. However, her marriage destroyed her dreams and weakened her faith. Her husband Tyrone fails to realize the promises he made to Mary, which makes her lose her faith in the marriage. The morphine addi ction drags her down and makes her unconscious about whether she lives in the past or present. The title of the play is a à ¡Ã °Long Dayà ¡Ã ¯s Journey into Nightà ¡Ã ±, but Mary, as she keeps taking morphine, travels mentally back to the past when she has fewer problems and happier life. Thus, for Mary, it is actually a long dayà ¡Ã ¯s journey into the past. In Act One, there are three points that are important to the developing of the character of Mary. One is that she realizes her beauty is fading away, and she is in the stages of decline; another is that she refuses to admit that there is a health problem with her and her son Edmund. Finally, there is the issue of Maryà ¡Ã ¯s specific idea of what a à ¡Ã °homeà ¡Ã ± is. At the beginning of the play, Tyrone and Jamie stare at Mary, and make her self-conscious (p27); they talk about her hair and remember the beautiful hair that Mary had when she was young. Mary realizes that she is getting old and she is very anxious about this, which is reflected when she asks people what is wrong with her hair several times. One of Maryà ¡Ã ¯s central flaws is her refusal to admit that there is a problem with herself or Edmund. She lies to her family many times about being cured, and she blames them for suspecting her.
Tuesday, October 1, 2019
Land, Public and Private Essay
1. Why do humans value land? Humans value land because it has multiple purposes such as agriculture, housing, recreation, industry, disposing waste, mining, etc. 2. What is the tragedy of the commons? What is an externality? The tragedy of commons is when people share a common resource they tend to deplete is because of self-interest and for a short term profit. 3. What is maximum sustainable yeild? Maximum sustainable yield is the maximum amount of harvest that the land can produce without having to compensate the future of the land or resource. 4. What are the main uses of public lands in the U.S.? The main uses of public lands in the United States is National parks, Managed resource protections areas, Habitat and species management areas, Strict Nature reserves and Wilderness areas, Protected landscapes and seascapes, National monuments, etc. 5. How do human land use decisions influence categories of public land classification? Human land use decisions influence categories of public land classification because what land we have interest in we will express more environmental policies, laws, and put more time in managing the land. 6. What are the ways in which timber is harvested in U.S. Forest, and how do they compare in terms of their environmental impact? Timber in the United States is harvest by commercial logging in exchange for a percentage of revenue. Clear cutting removes almost all of the trees within a certain area. This method is the most economical method because all the trees will be the same age because they are all planted at the same time. This method can also cause habitat alterations that can lose biodiversity. Selective cutting removes single trees out of a few number of trees. This method works only among shade tolerant trees because the other trees grow adjacently. The environment impact is less but the overall negatives effects are the same. 7. What is the significance of the National Wilderness Area designation for parts of federally owned lands? The significance of the National Wilderness Area forà parts of federally owned lands is to set aside land to preserve large intact ecosystems. The designated wilderness area however has roads that existed before the designations and may be still in use, mining activities can be permitted , and human use is limited but can still be done. 8. What is NEPA, and what is an environmental impact statements (EIS)? A NEPA is the National Environmental Policy Act of 1969. This act involves federal money or federal permits. The Environmental impact statement (EIS) outlines the scope and purpose of development project that describes the environmental context. 9. What are urban sprawl and smart growth? Urban sprawl is the creation of urbanized areas that spread into rural areas and remove clear boundaries. Smart growth is the strategies that encourage the development of sustainable, healthy communities. 10. How can zoning help reduce urban sprawl? Zoning can help reduce urban sprawl because it can create a quieter and safer community.
Movie and Book Comparison Essay
Tuesdays With Morrie is both a book and a movie. They are alike and different in so many different ways. The movie is never going to have as much detail as the book did, but they did a good job making the movie as close as possible to the book. The book covered a lot more aspects of the story than the movie did, and the book focused on the bigger more important parts. There were a lot of main points that the book and movie were alike. In both Morrie dies the same way with the same people around him. At the beginning of this story Mitch is so consumed in his job that he doesnââ¬â¢t give any attention to anything else but his column. As the story progresses Morrie starts to lighten up on the job and work towards a relationship with Morrie. By having this relationship with Morrie helps his relationship back home with his girlfriend who is getting tired of Mitch not giving her the attention she deserves. Janine and Morrie both play huge parts in Mitchââ¬â¢s life in both the movie and the book. The movie used a lot of the same lines used in the book such as Morrieââ¬â¢s aphorisms. One last thing that the book and movie had in common was that each time Mitch went to visit Morrie he could tell Morrie was getting worse and worse. Even though the movie did a great job making the book come to life, the movie and book had a couple differences. The movie never brought up Mitchââ¬â¢s brother like they did in the book. Another thing is in the movie they didnââ¬â¢t talk about Mitch as child like they did in the book. In the movie they show Janine giving the proposal ring back to Mitch in the airport, but in the book they never mentioned that. Also in the book they never talked about Mitchââ¬â¢s breakup with Janine and how he went to her studio and tried to fix it. Mitchââ¬â¢s relationship with Janine was way more a part of the movie than the book. The book focused more on the relationship between Morrie and Mitch when the movie focused on both. Some movies that are made from a book are most of the time completely different, but this movie resembled the book perfectly. The movie covered the most important parts of the book, which made it a success.
Subscribe to:
Posts (Atom)