Comparative Survey of Different Cryptographic Algorithm

Total Page:16

File Type:pdf, Size:1020Kb

Comparative Survey of Different Cryptographic Algorithm International Journal of Scientific & Engineering Research Volume 8, Issue 5, May-2017 ISSN 2229-5518 41 Comparative Survey of different Cryptographic Algorithm Alka Pandey Dr. M.A. Rizvi Abstract- Now days, Data security is very challenging issue that touches many areas including computers and communication. Recently, came across many attacks on cyber security that have played with the confidentiality of the users. These attacks just broke all the security algorithms and affected the confidentiality, authentication, integrity, availability and identification of user data. Cryptography is one such way to make sure that confidenti- ality, authentication, integrity, availability and identification of user data can be maintained as well as security and privacy of data can be provided to the user. Cryptography is used widely for the purpose of secure commu- nication and password management. It comprises the techniques of encryption and decryption mechanism. En- cryption is the process of converting normal data or plaintext to something inexplicable or cipher-text by apply- ing mathematical transformations or formulae. These mathematical transformations or formulae used for encryp- tion processes are called algorithms. In this paper we have analysed ten data encryption algorithms AES, DES, RSA, DIFFIE HELLMAN, THREEFISH, CLEFIA, ARIA, SPEAK, SIMON and CHIASMU etc, comparing their different parameters. So that in future the best algorithm method can be used for encryption and decryption of data. Index Terms— Security, Cryptography, Algorithm, Key, Cipher, Security attacks, Encryption, Decryption. —————————— —————————— It is one of the earliest used techniques of Cryptog- 1 INTRODUCTION raphy. Asymmetric Key Cryptography on the other Need of communication has no alternative since hand uses two keys for the purpose of encryption early ages. Today method of communication got and decryption. improved and now it has widely transformed in A Cryptographic protocol is a procedure carried technical ways. Along with social communication out between two parties which is used to perform the exchange of information is also needed where some security task. Typically cryptographic proto- privacy and safety play important role. [1] col makes use of one, or more, cryptographic primi- The need of exchanging information without being tives and/or schemes. An example might be the hacked theft or distorted gave birth to encryption transmission of a credit card number from Bob to and decryption of information. [2] an e-commerce web site Alice. Such a protocol The concept behindIJSER encryption and decryption to might involves a digital signature scheme9so Bob disorganizing or rearranging the information in an knows he is talking to Alice), and a form of encryp- unreadable way, this concept of information to pro- tion (to ensure Bob’s credit card details are not in- tect the information in an unreadable manner is tercepted in transit). Examples of deployed proto- refer to Cryptography. Cryptography is derived cols which perform such operations are TLS or IP- from two Greek words: "Kryptos" meaning 'hidden' Sec. and "graphein" meaning 'to write' i.e. hidden writ- 2. BASIC TERMS OF CRYPTOGRAPHY ing. The main feature of Cryptography is the use of Encryption - It is the act of obscuring a message by a secret key to encrypt and decrypt the sensitive mystifying its contents. It can also be used to create information. Cryptography is not only restricted to digital signatures, which helps in the authentication providing confidentiality and privacy but also pro- of a original message. vides authentication, data integrity, non repudiation Decryption – It is the inverse process of encryption. etc. Parameters considered while adopting a Cryp- Usually the cipher text or algorithm used for en- tographic techniques can be broadly divided into cryption is the one used for decryption. two broad spectrums: Asymmetric key Cryptog- Cipher – It is method, an algorithm function or pro- raphy and Symmetric key Cryptography. Symmet- cess for performing encryption or decryption. A ric key Cryptography uses a single key for the pur- cipher is a set of well defined steps which can be pose of encryption and decryption, and is shared followed to Crypt data. with both the sender and the receiver. Plaintext - any information before being encrypted ———————————————— or in its original undisturbed form. • Ms. Alka Pandey is currently pursuing masters degree program in Com- Cipher text - It is the output or the incomprehensi- puter technology Application in Rajiv Gandhi prodyogiki vishwavidyalaya, ble code obtained by encryption of the plain text. Bhopal, India,. E-mail: [email protected] Cryptanalysis - It is the act of trying to decipher an • Dr. M.A. Rizvi is currently working as Associate and Head professor in encrypted message without the cognition of the NITTTR ,Bhopal ,India,E-mail: [email protected] IJSER © 2017 http://www.ijser.org International Journal of Scientific & Engineering Research Volume 8, Issue 5, May-2017 ISSN 2229-5518 42 actual keys or the algorithm used during encryp- the availability of a verity of libraries implementing tion. The Cryptanalyst may have some part of the TLS. The TLS protocol suite aims to provide a con- plaintext and is interested in the rest of it have the fident ail channel rather than simply a key agree- cipher text and may want to know about the key ment protocol. The protocol is broken up into two and algorithms used. [4] phases: A handshake (or key agreement) phase and Cryptographic Attacks - They are classified as a record layer encryption phase. [6] 1) Passive attack - The goal here might be to only Limitation: Due to the non-systematic development read the contents of a message and not change process, the protocol is hard to analyse and easily anything. prone to implementation weaknesses. [7] 2) Active Attack - The goal here is to change the 4.2 SSH contents of the message to disable future use or General Description: Secure Shell (SSH) was origi- understanding of the message. nally designed as a replacement for insecure remote Cryptanalytic Technique - shell protocol such as telnet. It provides a secure 2) Cipher Text Only - The attacker tries to decipher channel between two networked computers for the message without having the knowledge about applications such as secure file transfer. In general the kind of information contained in the message the host one is connecting to be authenticated, and must conjecture from the cipher text only. whereas the client is not (although some corpora- Known Plaintext Attack – It is easy to predict or tions do insist on client side authentication for SSH guess some part of Plaintext for Attackers. usage). [16] 3) Man - in - the - Middle Attack - The idea behind Limitation: The main issues with SSH, much like this attack is to interpose the communication be- TLS, is that most of the standard encryption algo- tween two parties. The attacker can access the traf- rithm for the transport layer are not sufficient to fic, information, modify the original form and then ensure complete security. They possess a number of forward it to the receiver. Such attacks can be pre- cryptographic weaknesses, which would not exist if vented by public key encryption. the protocol choices had been made more recently. 4) Correlation - The main source of information in 4.3 IPSec the communication are the correlation between the secret key and the cipher text, and hence it enables General Description: IPSec provide security at the IP network layer of the TCP/IP protocol stack. This the attackers. 5) Attack Against or Using the Underlying Hard- differs from protocols such bas TLS and SSH, which provide security at higher layers such as the appli- ware These attacks make use of the data of the very fine cation layer. The main use of IPSec has been to cre- measurements of the cryptographic device to com- ate virtual private network (VPNs) which facilities secure communication over an untrusted network pute the key and the encryption information. IJSERsuch as the internet. [11] There are two main IPSec 6) Faults in the Cryptosystem - These can even lead to the discovery of the secret key [4] protocols which specify the actual cryptography 3. NEED OF CRYPTOGRAPHY processing applied to packets. These are called Au- thentication Header and Encapsulating security In the field of sharing information, data and im- payload.AH provides integrity protection, data portant files it has become mandatory. Not only in origin authentication and anti-reply service.ESP communication but also in defence areas, commer- provides similar service to AH and in addition pro- cial field and to protect individual data as well as vides confidentiality and traffic flow confidentiality extensive applications in our daily lives. The tech- service through symmetric key encryption and var- nique of cryptography covers all these parameters iable length padding of packets.Limitation: The key of security issues. It has become very essential tool agreement phase of IPSec, called IKE, is well stud- in protecting the sensitive information from unau- ied and well defined. As for TLS ads SSH the pay- thorized access and to provide information security. load encryption algorithm has had a number of [6] issues over the years, related to pour acceptance of 4. SPECIFIED PROTOCOL USED IN the need for AEAD? IND-OCA encryption algo- DATA SECURITY rithm. The protocols here were designed for specific tasks. 4.4 Kerberos 4.1 TLS General Description: Kerberos is an authentication General Description: The TLS protocol (the current service which allows a client to authentication his or version v1.2) is primary aimed at securing traffic herself to multiple services e.g. a printer or a file between an unauthenticated web browser and an server. It uses a trusted authentication server which authenticated web site, although the protocol is will grant tickets to participating users or parties now often used in other application due in part of allowing them to show their identity to each other.
Recommended publications
  • Rhetorical Code Studies Revised Pages
    Revised Pages rhetorical code studies Revised Pages Sweetland Digital rhetoric collaborative Series Editors: Anne Ruggles Gere, University of Michigan Naomi Silver, University of Michigan The Sweetland Digital Rhetoric Collaborative Book Series publishes texts that investigate the multiliteracies of digitally mediated spaces both within academia as well as other contexts. Rhetorical Code Studies: Discovering Arguments in and around Code Kevin Brock Developing Writers in Higher Education: A Longitudinal Study Anne Ruggles Gere, Editor Sites of Translation: What Multilinguals Can Teach Us about Digital Writing and Rhetoric Laura Gonzales Rhizcomics: Rhetoric, Technology, and New Media Composition Jason Helms Making Space: Writing, Instruction, Infrastrucure, and Multiliteracies James P. Purdy and Dànielle Nicole DeVoss, Editors Digital Samaritans: Rhetorical Delivery and Engagement in the Digital Humanities Jim Ridolfo diGitalculturebooks, an imprint of the University of Michigan Press, is dedicated to publishing work in new media studies and the emerging field of digital humanities. Revised Pages Rhetorical Code Studies discovering arguments in and around code Kevin Brock University of Michigan Press ann arbor Revised Pages Copyright © 2019 by Kevin Brock Some rights reserved This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. Note to users: A Creative Commons license is only valid when it is applied by the person or entity that holds rights to the licensed work. Works may contain components (e.g., photo- graphs, illustrations, or quotations) to which the rightsholder in the work cannot apply the license. It is ultimately your responsibility to independently evaluate the copyright status of any work or component part of a work you use, in light of your intended use.
    [Show full text]
  • The Origins of Beowulf Between Anglo-Saxon Tradition and Christian Latin Culture
    The Origins of Beowulf Between Anglo-Saxon Tradition and Christian Latin Culture Autor: Rubén Abellán García Tutor: Agustí Alemany Villamajó Universitat Autònoma de Barcelona 2019-2020 Index 1. Introduction .............................................................................................................. 2 1.1. The structure and transmission of Beowulf. ......................................................... 2 1.2. Literacy context during the creation period of Beowulf ....................................... 3 1.3. Historical Oral-formulaic and literacy research in Old studies ............................. 3 2. Latin Tradition in Beowulf ........................................................................................ 5 2.1. Latin syntax in Beowulf ...................................................................................... 5 2.2. Literary devices .................................................................................................. 6 2.2.1. Alliteration ...................................................................................................... 7 2.2.2. Formulas .......................................................................................................... 7 2.2.3. Compounding and Kennings ............................................................................ 8 2.2.4. Rhymes............................................................................................................ 8 2.2.5. Litotes and irony .............................................................................................
    [Show full text]
  • Illuminating the Darkness: the Naturalistic Evolution of Gothicism in the Nineteenth-Century British Novel and Visual Art
    University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Dissertations, Theses, and Student Research: Department of English English, Department of 8-2013 Illuminating the Darkness: The Naturalistic Evolution of Gothicism in the Nineteenth-Century British Novel and Visual Art Cameron Dodworth University of Nebraska-Lincoln Follow this and additional works at: https://digitalcommons.unl.edu/englishdiss Part of the Literature in English, British Isles Commons Dodworth, Cameron, "Illuminating the Darkness: The Naturalistic Evolution of Gothicism in the Nineteenth- Century British Novel and Visual Art" (2013). Dissertations, Theses, and Student Research: Department of English. 79. https://digitalcommons.unl.edu/englishdiss/79 This Article is brought to you for free and open access by the English, Department of at DigitalCommons@University of Nebraska - Lincoln. It has been accepted for inclusion in Dissertations, Theses, and Student Research: Department of English by an authorized administrator of DigitalCommons@University of Nebraska - Lincoln. ILLUMINATING THE DARKNESS: THE NATURALISTIC EVOLUTION OF GOTHICISM IN THE NINETEENTH- CENTURY BRITISH NOVEL AND VISUAL ART by Cameron Dodworth A DISSERTATION Presented to the Faculty of The Graduate College at the University of Nebraska In Partial Fulfillment of Requirements For the Degree of Doctor of Philosophy Major: English (Nineteenth-Century Studies) Under the Supervision of Professor Laura M. White Lincoln, Nebraska August, 2013 ILLUMINATING THE DARKNESS: THE NATURALISTIC EVOLUTION OF GOTHICISM IN THE NINETEENTH- CENTURY BRITISH NOVEL AND VISUAL ART Cameron Dodworth, Ph.D. University of Nebraska, 2013 Adviser: Laura White The British Gothic novel reached a level of very high popularity in the literary market of the late 1700s and the first two decades of the 1800s, but after that point in time the popularity of these types of publications dipped significantly.
    [Show full text]
  • Music and the Construction of Historical Narrative in 20Th and 21St Century African-American Literature
    1 Orientations in Time: Music and the Construction of Historical Narrative in 20th and 21st Century African-American Literature Leisl Sackschewsky A dissertation submitted in partial fulfillment of requirements for the degree of Doctor of Philosophy University of Washington 2016 Reading Committee: Sonnet Retman, Chair Habiba Ibrahim Alys Weinbaum Program Authorized to Offer Degree: English 2 © Copyright 2016 Leisl Sackschewsky 3 University of Washington Abstract Orientations in Time: Music and the Construction of Historical Narrative in 20th and 21st Century African-American Literature Chair of Supervisory Committee: Associate Professor Sonnet Retman American Ethnic Studies This dissertation argues that the intersections between African-American literature and music have been influential in both the development of hip-hop aesthetics and, specifically, their communication of historical narrative. Challenging hip-hop historiographers that narrate the movement as the materialization of a “phantom aesthetic”, or a sociological, cultural, technological, and musical innovation of the last forty years, this dissertation asserts that hip-hop artists deploy distinctly literary techniques in their attempts to animate, write, rewrite, rupture, or reclaim the past for the present. Through an analysis of 20th and 21st century African-American literary engagements with black music, musical figures, scenes of musical performance, and what I call ‘musical-oral’, I hope to demonstrate how prose representations of music disrupt the linear narratives of
    [Show full text]
  • The Innocent Sufferer in the Book of Proverbs
    FULLER THEOLOGICAL SEMINARY THE INNOCENT SUFFERER IN THE BOOK OF PROVERBS A Dissertation submitted to the Faculty of the School of Theology Fuller Theological Seminary in partial fulfillment of the requirements for the degree of Doctor of Philosophy BY DANIEL P. BRICKER PASADENA, CALIFORNIA MAY 1998 Copyright 1998 by Daniel P. Bricker All Rights Reserved Cited with permission by Ted Hildebrandt Report any errors to [email protected] Center for Advanced Theological Studies School of Theology, Fuller Theological Seminary Dissertation Approval Sheet This dissertation entitled The Innocent Sufferer in the Book of Proverbs written by Daniel P. Bricker and submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy has been awarded by the Faculty of Fuller Theological Seminary upon the recommendation of the following readers: __________________ Ronald Youngblood __________________ Frederic William Bush ___________________ Duane Garrett 5/27/98 Date Acknowledgments It is difficult for me to thank everyone who deserves credit. My friends and family members deserve recognition for the role they played in offering unswerving support. First on the list are my parents, Paul and Therese Bricker of Sherwood, Arkansas. They provided me with support in many ways, and I can never repay them for all they have done for me, both in relation to this program and in almost every other area of my life as well. Then I would like to thank all my friends who are far too numerous to mention by name. I would not have made it without their prayers and encouragement. I must make special mention of the late Dr.
    [Show full text]
  • Comparative Study on Various Cryptographic Techniques
    International Journal of Computer Applications (0975 – 8887) International Conference on Communication, Computing and Information Technology (ICCCMIT-2014) Comparative Study on Various Cryptographic Techniques K.B. Priya Iyer, Ph.D. R. Anusha R. Shakthi Priya Associate Professor Under Graduate Student Under Graduate Student M.O.P Vaishnav College for M.O.P Vaishnav College for M.O.P Vaishnav College for Women, Chennai, India Women, Chennai, India Women, Chennai, India ABSTRACT Selective encryption is the technique of encrypting some parts of a condensed data file while leaving other part of plain text In today’s world of internet technology that covers especially [3]4] communication network security is a challenging issue. unencrypted . This type of encryption saves time and cost Hackers try to gain control over our system and steel data for data to be encrypted. from it. To avoid this providing network security is an Encryption techniques can be categorized into three namely important task. Cryptography along with its various methods symmetric, asymmetric and hashing. is used to serve this purpose. Cryptography is a technique to protect message by transforming it into an unreadable format Symmetric key cryptography is an algorithm that uses the called cipher text. It provides authentication, identification to similar cryptographic keys for both encryption and decryption user data, confidentiality and also provides security and purpose. The keys may be indistinguishable. In order to privacy to the data stored. The main objective of this paper is maintain a personal information link this algorithms uses a to study the basic terms used in cryptography its purpose and special key that represent a secret that is to be shared between [2] to compare the encryption techniques used in cryptography.
    [Show full text]
  • ©Copyright 2014 Timothy Coombs Critical Conditions
    ©Copyright 2014 Timothy Coombs Critical Conditions: This Signature of the Wound in Franz Kafka’s Shorter Fiction Timothy Coombs A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy University of Washington 2014 Reading Committee: Richard T. Gray, Chair Eric Ames Richard Block Program Authorized to Offer Degree: Germanics University of Washington Abstract Critical Conditions: The Signature of the Wound in Franz Kafka’s Shorter Fiction Timothy Coombs Chair of the Supervisory Committee: Byron W. and Alice L. Lockwood Professor in the Humanities Richard T. Gray This dissertation explores the significance of wounds in four short texts by Franz Kafka: “Ein Landarzt,” “Das Urteil,” Ein Bericht für eine Akademie,” and “Prometheus.” Rather than reduce the metaphor of the wound to biographical or psychoanalytic principles, two approaches that have predominated scholarship on these texts, this study examines how the wound promotes a critical undecidability in Kafka’s language: a condition in which body and body of text demand and defy “treatment” on several levels. Using a variety of rhetorical, narratological, and philological evidence, this dissertation argues how woundedness functions as a “critical condition” in these texts that paradoxically extends and enriches their interpretive life — an openness that resists closure of any form. Acknowledgements This dissertation would not have been possible without the continuous support and encouragement of Rick Gray, whose Graduate seminar on Kafka inspired me to first open this wound, but whose mentorship helped me finally close it. I extend a similar sense of gratitude to my reading committee, Eric Ames and Richard Block, who always expressed an interest in my work, as well as to my friends and colleagues in Germanics department, especially Jan Hengge, Jasmin Krakenberg, and Nathan Magnusson.
    [Show full text]
  • Grausso2020.Pdf (6.319Mb)
    This thesis has been submitted in fulfilment of the requirements for a postgraduate degree (e.g. PhD, MPhil, DClinPsychol) at the University of Edinburgh. Please note the following terms and conditions of use: This work is protected by copyright and other intellectual property rights, which are retained by the thesis author, unless otherwise stated. A copy can be downloaded for personal non-commercial research or study, without prior permission or charge. This thesis cannot be reproduced or quoted extensively from without first obtaining permission in writing from the author. The content must not be changed in any way or sold commercially in any format or medium without the formal permission of the author. When referring to this work, full bibliographic details including the author, title, awarding institution and date of the thesis must be given. Chiasmus: A Phenomenon of Language, Body and Perception Christine M. Grausso Doctorate of Philosophy University of Edinburgh 2020 ii Acknowledgements I would especially like to thank my supervisor, Dr. John Joseph, for all of his guidance with my research. His exceptional good humor and detailed feedback were both helpful beyond measure. Thank you to Dr. Richard Shillcock, who reviewed my work and provided constructive suggestions during the process. Special thanks to Dr. Hannah Rohde for her kind direction and assistance at every stage – and to Dr. Jamin Pelkey, for his inspiring work on the topic of chiasmus and participation as my thesis examiner. Finally, thank you to my family – my parents, Frank and Virginia Grausso, and my aunt, Renee Hertz, for their constant encouragement; to Anne Chalmers for being a support whenever outside obstacles presented themselves; and especially to Claire Barrie, for her endless patience and compassion.
    [Show full text]
  • Nonhuman Voices in Anglo-​Saxon Literature and Material Culture
    i NONHUMAN VOICES IN ANGLO- SAXON LITERATURE AND MATERIAL CULTURE ii Series editors: Anke Bernau and David Matthews Series founded by: J. J. Anderson and Gail Ashton Advisory board: Ruth Evans, Nicola McDonald, Andrew James Johnston, Sarah Salih, Larry Scanlon and Stephanie Trigg The Manchester Medieval Literature and Culture series publishes new research, informed by current critical methodologies, on the literary cultures of medieval Britain (including Anglo- Norman, Anglo- Latin and Celtic writings), including post- medieval engagements with and representations of the Middle Ages (medievalism). ‘Literature’ is viewed in a broad and inclusive sense, embracing imaginative, historical, political, scientific, dramatic and religious writings. The series offers monographs and essay collections, as well as editions and translations of texts. Titles Available in the Series The Parlement of Foulys (by Geoffrey Chaucer) D. S. Brewer (ed.) Language and imagination in the Gawain- poems J. J. Anderson Water and fire:The myth of the Flood in Anglo- Saxon England Daniel Anlezark Greenery: Ecocritical readings of late medieval English literature Gillian Rudd Sanctity and pornography in medieval culture:On the verge Bill Burgwinkle and Cary Howie In strange countries: Middle English literature and its afterlife: Essays in Memory of J. J. Anderson David Matthews (ed.) A knight’s legacy: Mandeville and Mandevillian lore in early modern England Ladan Niayesh (ed.) Rethinking the South English legendaries Heather Blurton and Jocelyn Wogan- Browne (eds)
    [Show full text]
  • Wozu Kryptografie? Moderne Kryptografie
    ■nhaltsübersicht ……… ٠ ت ١ ﺀ ٦ mi ,一 ill ﻗﺎ ق; ﺋ ﺔ:::ئ,ق;: ﺗﺊ;'ذ:;ﺀب; ﻻ:ت: Wozu Kryptografie? ใ Einleitung 3 2 Was St Kryptografe und 9 3 Wie und vom wem Daten abgehört werden ใ 7 4 Klassische symmetrische Verschlüsselung 39 5 Die Enigma und andere 61 Teil2 iiii '::ئ ■;■ .٠٠í١vy Λ.,v:^:, :Í' Moderne Kryptografie 6 Der Data Encryption Standard 85 7 Chiffren-Design 97 8 Kryptoanalyse symmetrischer Verfahren 113 Symmetrische Verfahren, die vor dem AES entstanden sind 123 و 10 Der Advanced Encryption Standard (AES^ 137 11 AES-Kandidaten 151 12 Symmetrische Verfahren, die nach dem AES entstanden sind 171 13 Asymmetrische Verschlüsselung 189 14 Digitale Signaturen 215 15 Weitere asymmetrische Krypto-Verfahren 225 16 Kryptografische Hashfunktionen 241 ใ 7 Weitere kryptografische Hashfunktionen 265 18 Weitere Anwendungen kryptografischer Hashfunktionen 281 19 Kryptografische Zufallsgeneratoren 293 20 Kryptoanalyse mit Quantencomputern und Post-Quanten.Kryptografie 311 21 Stromchiffren 319 TeiiB, ' .. Implementierung von Kryptografie 22 Reallorld-Attacken 359 23 Standardisierung ỉn der Kryptografie 389 n Betriebsarten und Datenformatierung 409 25 Kryptografische Protokolle 427 ٩٩ไ Authentifizierung 26 27 Verteilte Authentifizierung 469 28 Krypto-Hardware und Krypto-Software 483 29 Management geheimer Schlüssel 505 30 Trusted Computing und Kryptografie 517 31 Kryptografische APIs 525 32 Evaluierung und Zertifizierung 537 Te؛l4 Public-Key-Infrastrukturen 33 Public-Key-Infrastrukturen 561 น Digitale Zertifikate 591 35 PKI-Prozesse ỉm Detail 607 36
    [Show full text]
  • Romantic Sobriety Wang, Orrin N
    Romantic Sobriety Wang, Orrin N. C. Published by Johns Hopkins University Press Wang, Orrin N. C. Romantic Sobriety: Sensation, Revolution, Commodification, History. Johns Hopkins University Press, 2011. Project MUSE. doi:10.1353/book.1766. https://muse.jhu.edu/. For additional information about this book https://muse.jhu.edu/book/1766 [ Access provided at 2 Oct 2021 11:55 GMT with no institutional affiliation ] This work is licensed under a Creative Commons Attribution 4.0 International License. Romantic Sobriety This page intentionally left blank Romantic Sobriety Sensation, Revolution, Commodifi cation, History ORRIN N. C. WANG The Johns Hopkins University Press Baltimore © 2011 The Johns Hopkins University Press All rights reserved. Published 2011 Printed in the United States of America on acid-free paper 2 4 6 8 9 7 5 3 1 The Johns Hopkins University Press 2715 North Charles Street Baltimore, Maryland 21218-4363 www.press.jhu.edu Library of Congress Cataloging-in-Publication Data Wang, Orrin Nan Chung, 1957– Romantic sobriety : sensation, revolution, commodifi cation, history / Orrin N. C. Wang. p. cm. Includes bibliographical references and index. ISBN-13: 978-1-4214-0066-2 (hardcover : alk. paper) ISBN-10: 1-4214-0066-9 (hardcover : alk. paper) 1. Romanticism. 2. Senses and sensation in literature. 3. Marxist criticism. 4. Deconstruction. 5. Literature—History and criticism—Theory, etc. I. Title. PN56.R7W37 2011 809Ј.9145—dc22 2010046803 A catalog record for this book is available from the British Library. Special discounts are available for bulk purchases of this book. For more information, please contact Special Sales at 410-516-6936 or [email protected].
    [Show full text]
  • Special Issue on Foucault's History of Sexuality Vol. 4, Confessions of The
    Foucault Studies Issue 29 April 2021 Special issue: History of Sexuality vol. 4 Confessions of the Flesh © Sverre Raffnsøe, Alain Beaulieu, Barbara Cruikshank, Bregham Dalgliesh, Knut Ove Eli- assen, Verena Erlenbusch, Alex Feldman, Marius Gudmand-Høyer, Thomas Götselius, Robert Har- vey, Robin Holt, Leonard Richard Lawlor, Daniele Lorenzini, Edward McGushin, Hernan Camilo Pulido Martinez, Giovanni Mascaretti, Johanna Oksala, Clare O’Farrell, Rodrigo Castro Orellana, Eva Bendix Petersen, Alan Rosenberg, Annika Skoglund, Dianna Taylor, Martina Tazzioli, Andreas Dahl Jakobsen, Rachel Raffnsøe & Signe Macholm Müller 2021 ISSN: 1832-5203 DOI: https://doi.org/10.22439/fs.vi29.6206 Foucault Studies, No. 29 i-iii, April 2021 EDITORIAL Sverre Raffnsøe, Alain Beaulieu, Barbara Cruikshank, Bregham Dalgliesh, Knut Ove Eliassen, Verena Erlenbusch, Alex Feldman, Marius GuDmanD-Høyer, Thomas Götse- lius, Robert Harvey, Robin Holt, Leonard Richard Lawlor, Daniele Lorenzini, Edward McGushin, Hernan Camilo Pulido Martinez, Giovanni Mascaretti, Johanna Oksala, Clare O’Farrell, Rodrigo Castro Orellana, Eva Bendix Petersen, Alan Rosenberg, Annika SkoglunD, Dianna Taylor, Martina Tazzioli, Andreas Dahl Jakobsen, Rachel Raffnsøe & Signe Macholm Müller. With this issue of Foucault Studies, a markedly expanded editorial team is established. While Sverre Raffnsøe, Alain Beaulieu, Barbara Cruikshank, Knut Ove Eliassen, Verena Erlenbusch, Alex Feldman, Marius GuDmanD-Høyer, Thomas Götselius, Robert Harvey, Leonard Richard Lawlor, Daniele Lorenzini, Edward McGushin, Hernan Camilo Pulido Martinez, Giovanni Mascaretti, Johanna Oksala, Clare O’Farrell, RoDrigo Castro Orella- na, Eva BenDix Petersen, Alan Rosenberg, Dianna Taylor and Martina Tazzioli continue on the editorial team, Foucault Studies is Delighted to welcome Annika SkoglunD1, Bregham Dalgliesh2 and Robin Holt3 as co-editors. The addition of prominent scholars to the eDitorial team marks a noticeable advance for Foucault Studies.
    [Show full text]