Voice Encryption Using Twin Stream Cipher Algorithm تشفير الصوت باستخدام خوارزمية التوأم

Total Page:16

File Type:pdf, Size:1020Kb

Voice Encryption Using Twin Stream Cipher Algorithm تشفير الصوت باستخدام خوارزمية التوأم Voice Encryption Using Twin Stream Cipher Algorithm تشفير الصوت باستخدام خوارزمية التوأم اﻻنسيابية Prepared by Omar Mejbel Hammad Aljouani ((401320142)) Supervisor Dr. Hebah H. O. Nasereddin Dr. Abdulkareem O. Ibadi Master Thesis Submitted in Partial Fulfillment of the Requirements of the Master Degree in Computer Science Department of Computer Science Faculty of Information Technology Middle East University Amman - Jordan January - 2016 II ((بسم هللا الرحمن الرحيم(( ّ يَ ْر ف عَََللاَهَا ّل ذي نََآ مَ هنواَ م ْن هك ْمََ وَا ّلَ ذي نََ} ه ه ْ ْ {أَوتواَال عل مََ دَ ر جات ))صدق هللا العظيم(( II III IV Acknowledgment I utilize this opportunity to thank everyone helped me reach this stage and everyone who encourage me during performing this thesis. I want to thank Dr. Hebah H. O. Nasereddin for her guidance and supervision during writing this thesis. Extended thanks are also for my family and friends who encourage me during writing this thesis. I also want to thank everyone who believes that the knowledge is right for everyone. The greatest thank ever to assistant prof. Abdulkareem O. Ibadi, the head of software engineering department at Baghdad College for economic sciences. V Dedication اهدي خﻻصة جهدي العلمي المتواضع الى : قرة عيني الرسول محمد عليه افضل الصﻻة واتم التسليم ...... وطني العراق الجريح .................................... اخي الشهيد الحاضر الغائب صهيب ................... والدي ووالدتي واختي رفاق دربي ومسيرتي ............... كل من كان له بصمة بجهدي العلمي هذا............. كل الشهداء الذين استشهدوا برصاص الغدر والخيانة ...... كل من كان يدعي لي ويوجهني ويتمنى لي الخير ......... جامعة بغداد أخص بها كلية التربية ابن الهيثم ....... اﻻعدادية المركزية للبنين .................. VI Table of Contents AUTHORIZATION STATEMENT ........................................................... II EXAMINATION COMMITTEE DECISION …………..………..III Acknowledgements......................................................................…......IV dedication… ...........................................................................................V Table of contents…………………………………………………….VI List of Figures…………………………………………………………VIII List of Tables…………………………………………………………..IX List of Abbreviations…………………………………………………X Abstract ..................................................................................................XI XII .......................................................................................................... الملخص Chapter One Introduction ............................................................................ 1 1 Chapter One Introduction ........................................................................ 2 1.1 Introduction ................................................................................................ 2 1.1.1 Stream Cipher............................................................................................................. 6 1.1.2 Advantages of Stream Cipher ................................................................................... 7 1.1.3 Shift Registers ........................................................................................................... 8 1.1.4 Linear-Feedback Shift Register ................................................................................. 9 1.1.5 Feedback with Carry Shift Registers ....................................................................... 10 1.1.6 Non-Linear Feedback Shift Registers ..................................................................... 11 1.1.7 Non-linear combiner of LFSRs ............................................................................... 11 1.1.8 Random Properties of Sequences ............................................................................ 12 1.2 Research Problem .................................................................................... 13 1.3 Research Objectives ................................................................................. 14 1.4 Motivation ................................................................................................ 15 1.5 Significance of Work ............................................................................... 15 1.6 Thesis outline ........................................................................................... 15 Chapter Two Backgrounds and Literature Review ................................ 17 2 Chapter Two Background and Literature Review .............................. 18 2.1 Overview .................................................................................................. 18 2.2 Background .............................................................................................. 18 2.2.1 Stream Cipher Usage................................................................................................ 19 2.2.2 Stream Cipher Security ............................................................................................ 20 VII 2.2.3 Types of Stream Cipher ........................................................................................... 21 2.2.3.1 Synchronous Stream Ciphers ……………………….………………………….21 2.2.3.2 Self-Synchronizing Stream Ciphers……………………………..…………………...22 2.2.4 Comparison of Stream Cipher .................................................................................. 22 2.3 Literature review ...................................................................................... 23 Chapter Three Research Methodology ..................................................... 32 3 Chapter Three Research Methodology ................................................. 33 3.1 Introduction .............................................................................................. 33 3.2 The Twin Concept ................................................................................... 35 3.3 Stream Cipher Algorithm ......................................................................... 35 3.4 The Proposed Twin Stream Cipher Algorithm ........................................ 36 3.5 The Combining Part ................................................................................. 36 3.6 The Driving Part ...................................................................................... 38 3.7 The Proposed Twin Stream Cipher Algorithm ........................................ 40 Chapter Four ............................................................................................... 42 Results and Discussion ................................................................................ 42 4 Chapter Four Results and Discussion ................................................... 43 4.1 Overview .................................................................................................. 43 4.2 The Based Algorithm Testing .................................................................. 44 4.3 The Twin Algorithm Testing ................................................................... 47 Chapter Five Conclusions and Future Work ........................................... 52 5 Chapter Five Conclusions and Future Work ....................................... 53 5.1 Conclusion ............................................................................................... 53 5.2 Future work .............................................................................................. 55 References .................................................................................................... 56 Appendix ...................................................................................................... 61 VIII List of Figures Figures Page Figure 1.1 Cryptology Classification (Ibadi, 2010) 3 Figure 1.2 Stream Cipher (Abdulsalam, 2011) 7 Figure 1.3 Shift Register with Feedback (Hell, Johansson, Maximov and Meier, 2006) 9 Figure 1.4 Linear Feedback Shift Register (Hell, Johansson and Meier, 2006) 9 Figure 1.5 Feedback with Carry Shift Register (Arnault, Berger and Pousse, 2011) 10 Figure 3.1 Methodology Block Diagram 34 Figure 3.2 Twin Algorithm Main Components 35 Figure 3.3 Stream Cipher Algorithm Parts 35 Figure 3.4 The Non-linear Part 37 Figure 3.5 The Driving Part of The Stream Cipher Algorithm 38 Figure 3.6 The Proposed Stream Cipher Algorithm 39 Figure 3.7 The Proposed Twin Stream Cipher Algorithm 44 Figure 3.8 Interface of the Proposed Algorithm 44 Figure 3.9 The Proposed Program Result 44 Figure 4.1 Interface of Twin Stream Cipher Algorithm 43 Figure 4.2 Twin Stream Cipher Algorithm Program Giving Results 43 Figure 4.3 The Statistical Test Program 54 Figure 4.4 The Statistical Test Program Results 54 IX List of Tables Table Page Table 2.1: Comparison of Stream Cipher 23 Table 3.1: The Truth Table of The Proposed Function 37 Table 4.1: The Based Algorithm Testing (6003 & 500 bits) 44 Table 4.2: The Based Algorithm Testing (6003 & 500 bits) 45 Table 4.3: New High Speed Stream Cipher Algorithms 46 Table 4.4 The Twin Algorithm Testing (5003 & 800 Bits) 47 Table 4.5 The Twin Algorithm Testing (6000 & 400 Bits) 48 Table 4.6 The Twin Algorithm Testing (24 & 22 Bits) 49 Table 4.7: The Twin Algorithm Testing (6000 & 400 bits) 54 X List of Abbreviations SR Shift Register FSR Feedback Shift Register LFSR Linear Feedback Shift Register FCSR Feedback with Carry Shift Register NLFSR Non-linear Feedback Shift Registers FPGA Field Programmable Gate Arrays ANF Algebraic Normal Form PR The Bernoulli Trials XI Abstract Voice Encryption Using Twin Stream Cipher Algorithm Prepared By: Omar Mejbel Hammad ((401320142)) Supervised By: Dr. Hebah H. O. Nasereddin. Dr. Abdelkareem. O.
Recommended publications
  • 2020 Sneak Peek Is Now Available
    GISWatch 2020 GISW SNEAK PEEK SNEAK PEEK GLOBAL INFORMATION atch 2020 SOCIETY WATCH 2020 Technology, the environment and a sustainable world: Responses from the global South ASSOCIATION FOR PROGRESSIVE COMMUNICATIONS (APC) AND SWEDISH INTERNATIONAL DEVELOPMENT COOPERATION AGENCY (SIDA) GISWatch 2020 SNEAK PEEK Global Information Society Watch 2020 SNEAK PEEK Technology, the environment and a sustainable world: Responses from the global South APC would like to thank the Swedish International Development Cooperation Agency (Sida) for their support for Global Information Society Watch 2020. Published by APC 2021 Creative Commons Attribution 4.0 International (CC BY 4.0) https://creativecommons.org/licenses/by/4.0/ Some rights reserved. Disclaimer: The views expressed herein do not necessarily represent those of Sida, APC or its members. GISWatch 2020 SNEAK PEEK Table of contents Introduction: Returning to the river.... ............................................4 Alan Finlay The Sustainable Development Goals and the environment ............................9 David Souter Community networks: A people – and environment – centred approach to connectivity ................................................13 “Connecting the Unconnected” project team www.rhizomatica.org; www.apc.org Australia . 18 Queensland University of Technology and Deakin University marcus foth, monique mann, laura bedford, walter fieuw and reece walters Brazil . .23 Brazilian Association of Digital Radio (ABRADIG) anna orlova and adriana veloso Latin America . 28 Gato.Earth danae tapia and paz peña Uganda . .33 Space for Giants oliver poole GISWatch 2020 SNEAK PEEK Introduction: Returning to the river Alan Finlay do not have the same power as governments or the agribusiness, fossil fuel and extractive industries, and that to refer to them as “stakeholders” would The terrain of environmental sustainability involves make this power imbalance opaque.
    [Show full text]
  • Joint Force Quarterly 97
    Issue 97, 2nd Quarter 2020 JOINT FORCE QUARTERLY Broadening Traditional Domains Commercial Satellites and National Security Ulysses S. Grant and the U.S. Navy ISSUE NINETY-SEVEN, 2 ISSUE NINETY-SEVEN, ND QUARTER 2020 Joint Force Quarterly Founded in 1993 • Vol. 97, 2nd Quarter 2020 https://ndupress.ndu.edu GEN Mark A. Milley, USA, Publisher VADM Frederick J. Roegge, USN, President, NDU Editor in Chief Col William T. Eliason, USAF (Ret.), Ph.D. Executive Editor Jeffrey D. Smotherman, Ph.D. Production Editor John J. Church, D.M.A. Internet Publications Editor Joanna E. Seich Copyeditor Andrea L. Connell Associate Editor Jack Godwin, Ph.D. Book Review Editor Brett Swaney Art Director Marco Marchegiani, U.S. Government Publishing Office Advisory Committee Ambassador Erica Barks-Ruggles/College of International Security Affairs; RDML Shoshana S. Chatfield, USN/U.S. Naval War College; Col Thomas J. Gordon, USMC/Marine Corps Command and Staff College; MG Lewis G. Irwin, USAR/Joint Forces Staff College; MG John S. Kem, USA/U.S. Army War College; Cassandra C. Lewis, Ph.D./College of Information and Cyberspace; LTG Michael D. Lundy, USA/U.S. Army Command and General Staff College; LtGen Daniel J. O’Donohue, USMC/The Joint Staff; Brig Gen Evan L. Pettus, USAF/Air Command and Staff College; RDML Cedric E. Pringle, USN/National War College; Brig Gen Kyle W. Robinson, USAF/Dwight D. Eisenhower School for National Security and Resource Strategy; Brig Gen Jeremy T. Sloane, USAF/Air War College; Col Blair J. Sokol, USMC/Marine Corps War College; Lt Gen Glen D. VanHerck, USAF/The Joint Staff Editorial Board Richard K.
    [Show full text]
  • Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices
    Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices † ‡ ‡ ‡ Nadia Heninger ∗ Zakir Durumeric ∗ Eric Wustrow J. Alex Halderman † University of California, San Diego ‡ The University of Michigan [email protected] {zakir, ewust, jhalderm}@umich.edu Abstract expect that today’s widely used operating systems and RSA and DSA can fail catastrophically when used with server software generate random numbers securely. In this malfunctioning random number generators, but the extent paper, we test that proposition empirically by examining to which these problems arise in practice has never been the public keys in use on the Internet. comprehensively studied at Internet scale. We perform The first component of our study is the most compre- the largest ever network survey of TLS and SSH servers hensive Internet-wide survey to date of two of the most and present evidence that vulnerable keys are surprisingly important cryptographic protocols, TLS and SSH (Sec- widespread. We find that 0.75% of TLS certificates share tion 3.1). By scanning the public IPv4 address space, keys due to insufficient entropy during key generation, we collected 5.8 million unique TLS certificates from and we suspect that another 1.70% come from the same 12.8 million hosts and 6.2 million unique SSH host keys faulty implementations and may be susceptible to com- from 10.2 million hosts. This is 67% more TLS hosts promise. Even more alarmingly, we are able to obtain than the latest released EFF SSL Observatory dataset [18]. RSA private keys for 0.50% of TLS hosts and 0.03% of Our techniques take less than 24 hours to scan the entire SSH hosts, because their public keys shared nontrivial address space for listening hosts and less than 96 hours common factors due to entropy problems, and DSA pri- to retrieve keys from them.
    [Show full text]
  • Comparison of 256-Bit Stream Ciphers at the Beginning of 2006
    Comparison of 256-bit stream ciphers at the beginning of 2006 Daniel J. Bernstein ? [email protected] Abstract. This paper evaluates and compares several stream ciphers that use 256-bit keys: counter-mode AES, CryptMT, DICING, Dragon, FUBUKI, HC-256, Phelix, Py, Py6, Salsa20, SOSEMANUK, VEST, and YAMB. 1 Introduction ECRYPT, a consortium of European research organizations, issued a Call for Stream Cipher Primitives in November 2004. A remarkable variety of ciphers were proposed in response by a total of 97 authors spread among Australia, Belgium, Canada, China, Denmark, England, France, Germany, Greece, Israel, Japan, Korea, Macedonia, Norway, Russia, Singapore, Sweden, Switzerland, and the United States. Evaluating a huge pool of stream ciphers, to understand the merits of each cipher, is not an easy task. This paper simplifies the task by focusing on the relatively small pool of ciphers that allow 256-bit keys. Ciphers limited to 128- bit keys (or 80-bit keys) are ignored. See Section 2 to understand my interest in 256-bit keys. The ciphers allowing 256-bit keys are CryptMT, DICING, Dragon, FUBUKI, HC-256, Phelix, Py, Py6, Salsa20, SOSEMANUK, VEST, and YAMB. I included 256-bit AES in counter mode as a basis for comparison. Beware that there are unresolved claims of attacks against Py (see [4] and [3]), SOSEMANUK (see [1]), and YAMB (see [5]). ECRYPT, using measurement tools written by Christophe De Canni`ere, has published timings for each cipher on several common general-purpose CPUs. The original tools and timings used reference implementations (from the cipher authors) but were subsequently updated for faster implementations (also from the cipher authors).
    [Show full text]
  • Hardness Evaluation of Solving MQ Problems
    MQ Challenge: Hardness Evaluation of Solving MQ Problems Takanori Yasuda (ISIT), Xavier Dahan (ISIT), Yun-Ju Huang (Kyushu Univ.), Tsuyoshi Takagi (Kyushu Univ.), Kouichi Sakurai (Kyushu Univ., ISIT) This work was supported by “Strategic Information and Communications R&D Promotion Programme (SCOPE), no. 0159-0091”, Ministry of Internal Affairs and Communications, Japan. The first author is supported by Grant-in-Aid for Young Scientists (B), Grant number 24740078. Fukuoka MQ challenge MQ challenge started on April 1st. https://www.mqchallenge.org/ ETSI Quantum Safe Workshop 2015/4/3 2 Why we need MQ challenge? • Several public key cryptosystems held contests which solve the associated basic mathematical problems. o RSA challenge(RSA Laboratories), ECC challenge(Certicom), Lattice challenge(TU Darmstadt) • Lattice challenge (http://www.latticechallenge.org/) o Target: Short vector problem o 2008 – now continued • Multivariate public-key cryptsystem (MPKC) also need to evaluate the current state-of-the-art in practical MQ problem solvers. We planed to hold MQ challenge. ETSI Quantum Safe Workshop 2015/4/3 3 Multivariate Public Key Cryptosystem (MPKC) • Advantage o Candidate for post-quantum cryptography o Used for both encryption and signature schemes • Encryption: Simple Matrix scheme (ABC scheme), ZHFE scheme • Signature: UOV, Rainbow o Efficient encryption and decryption and signature generation and verification. • Problems o Exact estimate of security of MPKC schemes o Huge length of secret and public keys in comparison with RSA o New application and function ETSI Quantum Safe Workshop 2015/4/3 4 MQ problem MPKC are public key cryptosystems whose security depends on the difficulty in solving a system of multivariate quadratic polynomials with coefficients in a finite field .
    [Show full text]
  • Side Channel Analysis Attacks on Stream Ciphers
    Side Channel Analysis Attacks on Stream Ciphers Daehyun Strobel 23.03.2009 Masterarbeit Ruhr-Universität Bochum Lehrstuhl Embedded Security Prof. Dr.-Ing. Christof Paar Betreuer: Dipl.-Ing. Markus Kasper Erklärung Ich versichere, dass ich die Arbeit ohne fremde Hilfe und ohne Benutzung anderer als der angegebenen Quellen angefertigt habe und dass die Arbeit in gleicher oder ähnlicher Form noch keiner anderen Prüfungsbehörde vorgelegen hat und von dieser als Teil einer Prüfungsleistung angenommen wurde. Alle Ausführungen, die wörtlich oder sinngemäß übernommen wurden, sind als solche gekennzeichnet. Bochum, 23.März 2009 Daehyun Strobel ii Abstract In this thesis, we present results from practical differential power analysis attacks on the stream ciphers Grain and Trivium. While most published works on practical side channel analysis describe attacks on block ciphers, this work is among the first ones giving report on practical results of power analysis attacks on stream ciphers. Power analyses of stream ciphers require different methods than the ones used in todays most popular attacks. While for the majority of block ciphers it is sufficient to attack the first or last round only, to analyze a stream cipher typically the information leakages of many rounds have to be considered. Furthermore the analysis of hardware implementations of stream ciphers based on feedback shift registers inevitably leads to methods combining algebraic attacks with methods from the field of side channel analysis. Instead of a direct recovery of key bits, only terms composed of several key bits and bits from the initialization vector can be recovered. An attacker first has to identify a sufficient set of accessible terms to finally solve for the key bits.
    [Show full text]
  • Petawatt and Exawatt Class Lasers Worldwide
    Petawatt and exawatt class lasers worldwide Colin Danson, Constantin Haefner, Jake Bromage, Thomas Butcher, Jean-Christophe Chanteloup, Enam Chowdhury, Almantas Galvanauskas, Leonida Gizzi, Joachim Hein, David Hillier, et al. To cite this version: Colin Danson, Constantin Haefner, Jake Bromage, Thomas Butcher, Jean-Christophe Chanteloup, et al.. Petawatt and exawatt class lasers worldwide. High Power Laser Science and Engineering, Cambridge University Press, 2019, 7, 10.1017/hpl.2019.36. hal-03037682 HAL Id: hal-03037682 https://hal.archives-ouvertes.fr/hal-03037682 Submitted on 3 Dec 2020 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. High Power Laser Science and Engineering, (2019), Vol. 7, e54, 54 pages. © The Author(s) 2019. This is an Open Access article, distributed under the terms of the Creative Commons Attribution licence (http://creativecommons.org/ licenses/by/4.0/), which permits unrestricted re-use, distribution, and reproduction in any medium, provided the original work is properly cited. doi:10.1017/hpl.2019.36 Petawatt and exawatt class lasers worldwide Colin N. Danson1;2;3, Constantin Haefner4;5;6, Jake Bromage7, Thomas Butcher8, Jean-Christophe F. Chanteloup9, Enam A. Chowdhury10, Almantas Galvanauskas11, Leonida A.
    [Show full text]
  • Hardware Implementation of Four Byte Per Clock RC4 Algorithm Rourab Paul, Amlan Chakrabarti, Senior Member, IEEE, and Ranjan Ghosh
    JOURNAL OF LATEX CLASS FILES, VOL. 6, NO. 1, JANUARY 2007 1 Hardware Implementation of four byte per clock RC4 algorithm Rourab Paul, Amlan Chakrabarti, Senior Member, IEEE, and Ranjan Ghosh, Abstract—In the field of cryptography till date the 2-byte in 1-clock is the best known RC4 hardware design [1], while 1-byte in 1-clock [2], and the 1-byte in 3 clocks [3][4] are the best known implementation. The design algorithm in[2] considers two consecutive bytes together and processes them in 2 clocks. The design [1] is a pipelining architecture of [2]. The design of 1-byte in 3-clocks is too much modular and clock hungry. In this paper considering the RC4 algorithm, as it is, a simpler RC4 hardware design providing higher throughput is proposed in which 6 different architecture has been proposed. In design 1, 1-byte is processed in 1-clock, design 2 is a dynamic KSA-PRGA architecture of Design 1. Design 3 can process 2 byte in a single clock, where as Design 4 is Dynamic KSA-PRGA architecture of Design 3. Design 5 and Design 6 are parallelization architecture design 2 and design 4 which can compute 4 byte in a single clock. The maturity in terms of throughput, power consumption and resource usage, has been achieved from design 1 to design 6. The RC4 encryption and decryption designs are respectively embedded on two FPGA boards as co-processor hardware, the communication between the two boards performed using Ethernet. Keywords—Computer Society, IEEEtran, journal, LATEX, paper, template.
    [Show full text]
  • *UPDATED Canadian Values 07-04 201 7/26/2016 4:42:21 PM *UPDATED Canadian Values 07-04 202 COIN VALUES: CANADA 02 .0 .0 12
    CANADIAN VALUES By Michael Findlay Large Cents VG-8 F-12 VF-20 EF-40 MS-60 MS-63R 1917 1.00 1.25 1.50 2.50 13. 45. CANADA COIN VALUES: 1918 1.00 1.25 1.50 2.50 13. 45. 1919 1.00 1.25 1.50 2.50 13. 45. 1920 1.00 1.25 1.50 3.00 18. 70. CANADIAN COIN VALUES Small Cents PRICE GUIDE VG-8 F-12 VF-20 EF-40 MS-60 MS-63R GEORGE V All prices are in U.S. dollars LargeL Cents C t 1920 0.20 0.35 0.75 1.50 12. 45. Canadian Coin Values is a comprehensive retail value VG-8 F-12 VF-20 EF-40 MS-60 MS-63R 1921 0.50 0.75 1.50 4.00 30. 250. guide of Canadian coins published online regularly at Coin VICTORIA 1922 20. 23. 28. 40. 200. 1200. World’s website. Canadian Coin Values is provided as a 1858 70. 90. 120. 200. 475. 1800. 1923 30. 33. 42. 55. 250. 2000. reader service to collectors desiring independent informa- 1858 Coin Turn NI NI 2500. 5000. BNE BNE 1924 6.00 8.00 11. 16. 120. 800. tion about a coin’s potential retail value. 1859 4.00 5.00 6.00 10. 50. 200. 1925 25. 28. 35. 45. 200. 900. Sources for pricing include actual transactions, public auc- 1859 Brass 16000. 22000. 30000. BNE BNE BNE 1926 3.50 4.50 7.00 12. 90. 650. tions, fi xed-price lists and any additional information acquired 1859 Dbl P 9 #1 225.
    [Show full text]
  • 9/11 Report”), July 2, 2004, Pp
    Final FM.1pp 7/17/04 5:25 PM Page i THE 9/11 COMMISSION REPORT Final FM.1pp 7/17/04 5:25 PM Page v CONTENTS List of Illustrations and Tables ix Member List xi Staff List xiii–xiv Preface xv 1. “WE HAVE SOME PLANES” 1 1.1 Inside the Four Flights 1 1.2 Improvising a Homeland Defense 14 1.3 National Crisis Management 35 2. THE FOUNDATION OF THE NEW TERRORISM 47 2.1 A Declaration of War 47 2.2 Bin Ladin’s Appeal in the Islamic World 48 2.3 The Rise of Bin Ladin and al Qaeda (1988–1992) 55 2.4 Building an Organization, Declaring War on the United States (1992–1996) 59 2.5 Al Qaeda’s Renewal in Afghanistan (1996–1998) 63 3. COUNTERTERRORISM EVOLVES 71 3.1 From the Old Terrorism to the New: The First World Trade Center Bombing 71 3.2 Adaptation—and Nonadaptation— ...in the Law Enforcement Community 73 3.3 . and in the Federal Aviation Administration 82 3.4 . and in the Intelligence Community 86 v Final FM.1pp 7/17/04 5:25 PM Page vi 3.5 . and in the State Department and the Defense Department 93 3.6 . and in the White House 98 3.7 . and in the Congress 102 4. RESPONSES TO AL QAEDA’S INITIAL ASSAULTS 108 4.1 Before the Bombings in Kenya and Tanzania 108 4.2 Crisis:August 1998 115 4.3 Diplomacy 121 4.4 Covert Action 126 4.5 Searching for Fresh Options 134 5.
    [Show full text]
  • World Economic Survey 1963
    WORLD ECONOMIC SURVEY 1963 II. Current Economic Developments UNITED NATIONS Department of Economic and Social Affairs Vv'©RLD ECONOMIC SURVEY 1963 t II. Current Economic Developments UNITED NATIONS New York, 1964 E/3902/Rev.1 ST/Y, CA/Sa UNITED NATIONS PUBLICATION J Sales No. : 64. II.C. 3 Price: SU.S. 1.50 (or equivalent in other currencies) FOREWORD This report represents part II of the World Economic Survey, 1963. As indicated in the Foreword to part I, "'Trade and Development: Trends, Needs and Policies" (Sales No. :64.II.C.1), it consists of three chapters and an annex dealing with recent developments in the world economy. Chapter 1 analyses the situation in the industrially advanced private enterprise countries. Chapter 2 reviews current trends in the Countries that are heavily dependent on the export of primary commodities. Chapter 3 provides an account of recent changes in the centrally planned economies. The three chapters follow an introduction which draws attention to some of the salient features of the current situation. The annex presents a summary of the current primary commodity situation. Most of the analysis is concerned with the calendar year 1963; chapters 1 and 2 conclude with brief assessments of the outlook for 1964. These discussions of outlook draw to a large extent on the replies of Governments to a questionnaire on economic trends, problems and policies circulated by the Secretary-General in November 1963. Like part I, part II of the World Economic Survey, 1963 was prepared in the Department of Economic and Social Affairs by the Bureau of General Economic Research and Policies.
    [Show full text]
  • An Introduction to Cryptography Copyright © 1990-1999 Network Associates, Inc
    An Introduction to Cryptography Copyright © 1990-1999 Network Associates, Inc. and its Affiliated Companies. All Rights Reserved. PGP*, Version 6.5.1 6-99. Printed in the United States of America. PGP, Pretty Good, and Pretty Good Privacy are registered trademarks of Network Associates, Inc. and/or its Affiliated Companies in the US and other countries. All other registered and unregistered trademarks in this document are the sole property of their respective owners. Portions of this software may use public key algorithms described in U.S. Patent numbers 4,200,770, 4,218,582, 4,405,829, and 4,424,414, licensed exclusively by Public Key Partners; the IDEA(tm) cryptographic cipher described in U.S. patent number 5,214,703, licensed from Ascom Tech AG; and the Northern Telecom Ltd., CAST Encryption Algorithm, licensed from Northern Telecom, Ltd. IDEA is a trademark of Ascom Tech AG. Network Associates Inc. may have patents and/or pending patent applications covering subject matter in this software or its documentation; the furnishing of this software or documentation does not give you any license to these patents. The compression code in PGP is by Mark Adler and Jean-Loup Gailly, used with permission from the free Info-ZIP implementation. LDAP software provided courtesy University of Michigan at Ann Arbor, Copyright © 1992-1996 Regents of the University of Michigan. All rights reserved. This product includes software developed by the Apache Group for use in the Apache HTTP server project (http://www.apache.org/). Copyright © 1995-1999 The Apache Group. All rights reserved. See text files included with the software or the PGP web site for further information.
    [Show full text]