Part II Chapters

Total Page:16

File Type:pdf, Size:1020Kb

Part II Chapters Significance of identity, individuality & ideology in Old Kingdom tomb iconography Verma, S. Citation Verma, S. (2011, June 22). Significance of identity, individuality & ideology in Old Kingdom tomb iconography. Retrieved from https://hdl.handle.net/1887/17722 Version: Not Applicable (or Unknown) Licence agreement concerning inclusion of doctoral thesis in the License: Institutional Repository of the University of Leiden Downloaded from: https://hdl.handle.net/1887/17722 Note: To cite this publication please use the final published version (if applicable). - - - 174 - Part 2 - - - 175 - Chapter 5 Criteria for the Selected Motifs Part 1 abstained from extensive discussions of the attributes of the individual motifs found in the elite tombs in Dynasties 5 and 6, because the objective was to establish an understanding of whether generic (i.e. common) values of iconography could apply to funerary art. The present section deals with the criteria for the selection of the motifs to be analyzed in Part 2. The West wall of the chapel is now accepted as being primarily concerned with the ritualistic function involving the hereafter; 487 therefore the selection will be from the other walls, and focus on their composition, placement, and communicative nature. The idea is to show that the culturally generic aspects of identity, individuality, ideology, and memory in the iconography of the Memphite tombs of the elite officials are an all-encompassing broad phenomenon, despite the stylistic uniformity that Memphite artists strove towards. It is accepted that to confine oneself only to the secular nature of the other walls, would be too simplistic an approach because: • It ignores the fact that scenes which appear secular at one level (e.g. the physical act of dragging a statue may at a higher level be ritual e.g. the censing of the statue in these dragging scenes). Even at its most basic level that of grave goods, which although made in this world, were ostensibly understood to have a putative use in the hereafter. This dichotomy of reality is endemic throughout ancient Egyptian iconography. • It ignores the religious context in which the ancient Egyptians lived. These all-important religious activities are often shown in the form of rituals, which follow a set, repeated, sometimes rehearsed pattern (dominated by customs, conventions, traditions, taboos linked to decorum) in which the 487 Junker, Giza vol. 3, 103. See also Bonnet, Reallexikon der Ägyptischen Religionsgeschichte 867. - - - 176 - participants play relatively fixed roles. Such rituals allow little scope for an individual person to vary the ritual, because the rituals are “patterns of thought that attribute to phenomena supra-sensible qualities which… are not derived from observation” 488 . On the other hand the ritual demands that the dead represented in the form of visible icons, be treated with respect and understanding as distinct individuals, a corollary of which is that the dead thereby persist in the memory too. Once it is realized, that the concept of memory is the basis of all funerary art, it follows that the workings of this idea play a crucial role, indeed are the key ingredients of what are termed the generics. Secular activities being less subject to religious restrictions allow the individual more scope to do things in his own way, and thus to express his particular self. It becomes obvious that the expressing of the self will also involve the individual in all those common values, which are called ‘generic’. One cannot deny that the individual’s activities in real life might also have had a religious foundation, but because this is not directly observable in the iconography of Old Kingdom elite tombs, they cannot be pursued in detail. The tomb-owner is the central figure, therefore his involvement either directly or indirectly with people and things, results in his personal differentiation 489 . This is an archeological fact, the consequence of being part of a community. This would also suggest some correlation between the esteem which was given to him during his life, and that which was given to him in his tomb, again pointing to the existence of generics in the tomb and its contents. Having established that certain values are found in all funerary art it is now proposed to select the motifs and see the extent of their application in the activities of the tomb-owner. 488 M. Gluckman, "Les Rites de Passage," in Essays on the ritual of social relations , ed. M. Gluckman and C. D. Forde (Manchester: Manchester University Press, 1962), 22. See also W. James, The ceremonial animal: a new portrait of anthropology (New York: Oxford University Press, 2003) 107. 489 Lepsius, Denkmäler aus Ägypten und Äthiopien pls. 3, 25, 44, 69, 86 & 89. - - - 1 77 - Numerous motifs could be chosen to show commemoration; demonstrating identity, individuality, and ideology as different, culturally significant aspects. It is acknowledged that unbiased representative selection is crucial yet difficult. If one looks closely at all non-ritual scenes, it becomes obvious that they all contain some form or other of generic values. Equally, it is clear that the motifs selected must cut across a cross section of the known representations, such that they include the tomb-owner during the different parts of his life. The selected motifs then should include the following abstract/iconological themes: 1. The social rank of the tomb-owner and the number and composition of persons having duty relationships towards him. 2. Active/Passive participation by the tomb-owner in a communal act. 3. Participation by members of his family, kin, and community in pursuance of commemoration. 4. Inclusion of many varieties of elevated status goods made in this world but also required in the hereafter. 5. Indications of perceived idioms of identity, ideology, and individuality (directly or indirectly) existing as part of funerary art. In line with the above guidelines, the selected iconographic motifs including related inscriptional texts are: • Carrying-chair scene • Taking-Account scene • Mourning as part of the funeral processes scene As with everything connected with Egyptology, there will always be exceptions, and it may well be that the choice of motifs will be subject to objections, all the more so when the material is incomplete or missing. However this is no excuse for avoiding an attempt to understand the causes of the conception, creation, and cultural impact of the iconography. If at a later date certain causal concepts need to be amended, this is not a disaster, - - - 178 - because the very attempt can be illuminating, as knowledge can also come in small increments. I have selected the above-mentioned motifs for consideration because these represent the full length of a life; they are clear illustrations of the continuing emphasis on the generics. Additionally I feel that the processes and outcomes in them seem to unfold faster which can lead to more clarity. My method will be to use a multi-pronged approach basing it on the macro analysis of the widespread ‘socially engineered’ (the generics) indications that directly affected ancient Egypt (the subject of Part I of this study). The consequences of these generics, intended and otherwise as depicted in the selected iconography (the subject of Part 2), then enable one to move down and dig deeper to uncover facts and reliable data that support, or refute, the big picture analysis. Each of the scenes will at first be deconstructed in detail, and then contextualized to highlight the cultural significance of the parties/objects/inscriptions; finally generic (common patterns) will be identified. For ease of reference these motifs are included in a separate volume as follows: • Carrying-chair numbered 001- 0037 • Taking Account numbered 0051- 0088 • Mourning numbered 00101- 00103 - - - 179 - Chapter 6 The Carrying-Chair Compared to today’s society, our grandparents had a different mindset, e.g. attitudes and perceptions about morals, obligations, class, etc. The ancient Egyptians probably had an even more different mindset: such that whilst a modern person might be able to translate the Egyptians’ words and actions accurately, the perception, and meaning of both of these may differ. Consider the carrying-chair motif which for the ancient Egyptians could mean a number of things. Status probably was the main reason. However status can cover a wide variety of areas, e.g. those associated with age (e.g. village elders’ experience, health), kinship structure as in feudal aristocracies, and wealth as with modern social classes. For arguments sake let us begin as a starting point with the following non-controversial propositions: - that the number of carrying-chair motifs is but a minor selection of that which may have existed, - that as wood rots easily we do not have any existing actual carrying-chairs, - that the carrying-chair was a scarce and valuable resource. Because funerary expenditure was one prime concern of the elite’s existence and because this was not equal, the possession of an independent means of transport meant a higher level of status, wealth, and comfort. The depiction of such an object would therefore imply an equivalent association in the afterlife. One can therefore conclude with a high degree of probability, that the possession of a carrying-chair was an elite attribute. The detailed analysis of the carrying-chair motif and its components attempts to attain some precision in dealing with such and related concepts, when assessing the role of the generics in Egyptian art and society. 6.1 General Characteristics The motif of the carrying-chair and its occupant(s) are found among the reliefs in the mastabas of the elite of the Old Kingdom as given in Appendix ‘A’ 490 and was a symbol of high social rank and importance 491 . The oldest depiction of a possible carrying-chair is that seen in the Narmer/Scorpion 490 A detailed list of all related scenes appears in Appendix 'A' of the list of tombs.
Recommended publications
  • On the Decorrelated Fast Cipher (DFC) and Its Theory
    On the Decorrelated Fast Cipher (DFC) and Its Theory Lars R. Knudsen and Vincent Rijmen ? Department of Informatics, University of Bergen, N-5020 Bergen Abstract. In the first part of this paper the decorrelation theory of Vaudenay is analysed. It is shown that the theory behind the propo- sed constructions does not guarantee security against state-of-the-art differential attacks. In the second part of this paper the proposed De- correlated Fast Cipher (DFC), a candidate for the Advanced Encryption Standard, is analysed. It is argued that the cipher does not obtain prova- ble security against a differential attack. Also, an attack on DFC reduced to 6 rounds is given. 1 Introduction In [6,7] a new theory for the construction of secret-key block ciphers is given. The notion of decorrelation to the order d is defined. Let C be a block cipher with block size m and C∗ be a randomly chosen permutation in the same message space. If C has a d-wise decorrelation equal to that of C∗, then an attacker who knows at most d − 1 pairs of plaintexts and ciphertexts cannot distinguish between C and C∗. So, the cipher C is “secure if we use it only d−1 times” [7]. It is further noted that a d-wise decorrelated cipher for d = 2 is secure against both a basic linear and a basic differential attack. For the latter, this basic attack is as follows. A priori, two values a and b are fixed. Pick two plaintexts of difference a and get the corresponding ciphertexts.
    [Show full text]
  • Report on the AES Candidates
    Rep ort on the AES Candidates 1 2 1 3 Olivier Baudron , Henri Gilb ert , Louis Granb oulan , Helena Handschuh , 4 1 5 1 Antoine Joux , Phong Nguyen ,Fabrice Noilhan ,David Pointcheval , 1 1 1 1 Thomas Pornin , Guillaume Poupard , Jacques Stern , and Serge Vaudenay 1 Ecole Normale Sup erieure { CNRS 2 France Telecom 3 Gemplus { ENST 4 SCSSI 5 Universit e d'Orsay { LRI Contact e-mail: [email protected] Abstract This do cument rep orts the activities of the AES working group organized at the Ecole Normale Sup erieure. Several candidates are evaluated. In particular we outline some weaknesses in the designs of some candidates. We mainly discuss selection criteria b etween the can- didates, and make case-by-case comments. We nally recommend the selection of Mars, RC6, Serp ent, ... and DFC. As the rep ort is b eing nalized, we also added some new preliminary cryptanalysis on RC6 and Crypton in the App endix which are not considered in the main b o dy of the rep ort. Designing the encryption standard of the rst twentyyears of the twenty rst century is a challenging task: we need to predict p ossible future technologies, and wehavetotake unknown future attacks in account. Following the AES pro cess initiated by NIST, we organized an op en working group at the Ecole Normale Sup erieure. This group met two hours a week to review the AES candidates. The present do cument rep orts its results. Another task of this group was to up date the DFC candidate submitted by CNRS [16, 17] and to answer questions which had b een omitted in previous 1 rep orts on DFC.
    [Show full text]
  • Security Evaluation of the K2 Stream Cipher
    Security Evaluation of the K2 Stream Cipher Editors: Andrey Bogdanov, Bart Preneel, and Vincent Rijmen Contributors: Andrey Bodganov, Nicky Mouha, Gautham Sekar, Elmar Tischhauser, Deniz Toz, Kerem Varıcı, Vesselin Velichkov, and Meiqin Wang Katholieke Universiteit Leuven Department of Electrical Engineering ESAT/SCD-COSIC Interdisciplinary Institute for BroadBand Technology (IBBT) Kasteelpark Arenberg 10, bus 2446 B-3001 Leuven-Heverlee, Belgium Version 1.1 | 7 March 2011 i Security Evaluation of K2 7 March 2011 Contents 1 Executive Summary 1 2 Linear Attacks 3 2.1 Overview . 3 2.2 Linear Relations for FSR-A and FSR-B . 3 2.3 Linear Approximation of the NLF . 5 2.4 Complexity Estimation . 5 3 Algebraic Attacks 6 4 Correlation Attacks 10 4.1 Introduction . 10 4.2 Combination Generators and Linear Complexity . 10 4.3 Description of the Correlation Attack . 11 4.4 Application of the Correlation Attack to KCipher-2 . 13 4.5 Fast Correlation Attacks . 14 5 Differential Attacks 14 5.1 Properties of Components . 14 5.1.1 Substitution . 15 5.1.2 Linear Permutation . 15 5.2 Key Ideas of the Attacks . 18 5.3 Related-Key Attacks . 19 5.4 Related-IV Attacks . 20 5.5 Related Key/IV Attacks . 21 5.6 Conclusion and Remarks . 21 6 Guess-and-Determine Attacks 25 6.1 Word-Oriented Guess-and-Determine . 25 6.2 Byte-Oriented Guess-and-Determine . 27 7 Period Considerations 28 8 Statistical Properties 29 9 Distinguishing Attacks 31 9.1 Preliminaries . 31 9.2 Mod n Cryptanalysis of Weakened KCipher-2 . 32 9.2.1 Other Reduced Versions of KCipher-2 .
    [Show full text]
  • Being in Cyberspace
    Virtually Real: Being In Cyberspace By Morgan Leigh A thesis submitted in fulfillment of the requirements for the degree of Doctor of Philosophy University of Tasmania November, 2014 1 Statement of Originality This thesis contains no material which has been accepted for a degree or diploma by the University or any other institution, except by way of background information and duly acknowledged in the thesis, and to the best of the my knowledge and belief no material previously published or written by another person except where due acknowledgement is made in the text of the thesis, nor does the thesis contain any material that infringes copyright. Statement of Ethical Conduct The research associated with this thesis abides by the international and Australian codes on human and animal experimentation, the guidelines by the Australian Government's Office of the Gene Technology Regulator and the rulings of the Safety, Ethics and Institutional Biosafety Committees of the University. Morgan Leigh 7/11/2014 Authority of Access This thesis is licensed under the Creative Commons Attribution-ShareAlike 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by-sa/4.0/. You are free to: • Share — copy and redistribute the material in any medium or format • Adapt — remix, transform, and build upon the material • for any purpose, even commercially. • The licensor cannot revoke these freedoms as long as you follow the license terms. Under the following terms: • Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
    [Show full text]
  • Identifying Open Research Problems in Cryptography by Surveying Cryptographic Functions and Operations 1
    International Journal of Grid and Distributed Computing Vol. 10, No. 11 (2017), pp.79-98 http://dx.doi.org/10.14257/ijgdc.2017.10.11.08 Identifying Open Research Problems in Cryptography by Surveying Cryptographic Functions and Operations 1 Rahul Saha1, G. Geetha2, Gulshan Kumar3 and Hye-Jim Kim4 1,3School of Computer Science and Engineering, Lovely Professional University, Punjab, India 2Division of Research and Development, Lovely Professional University, Punjab, India 4Business Administration Research Institute, Sungshin W. University, 2 Bomun-ro 34da gil, Seongbuk-gu, Seoul, Republic of Korea Abstract Cryptography has always been a core component of security domain. Different security services such as confidentiality, integrity, availability, authentication, non-repudiation and access control, are provided by a number of cryptographic algorithms including block ciphers, stream ciphers and hash functions. Though the algorithms are public and cryptographic strength depends on the usage of the keys, the ciphertext analysis using different functions and operations used in the algorithms can lead to the path of revealing a key completely or partially. It is hard to find any survey till date which identifies different operations and functions used in cryptography. In this paper, we have categorized our survey of cryptographic functions and operations in the algorithms in three categories: block ciphers, stream ciphers and cryptanalysis attacks which are executable in different parts of the algorithms. This survey will help the budding researchers in the society of crypto for identifying different operations and functions in cryptographic algorithms. Keywords: cryptography; block; stream; cipher; plaintext; ciphertext; functions; research problems 1. Introduction Cryptography [1] in the previous time was analogous to encryption where the main task was to convert the readable message to an unreadable format.
    [Show full text]
  • Improbable Differential from Impossible Differential
    Improbable Differential from Impossible Differential: On the Validity of the Model C´elineBlondeau Aalto University, School of Science, Department of Information and Computer Science [email protected] Abstract. Differentials with low probability are used in improbable dif- ferential cryptanalysis to distinguish a cipher from a random permuta- tion. Due to large diffusion, finding such differentials for actual ciphers re- mains a challenging task. At Indocrypt 2010, Tezcan proposed a method to derive improbable differential distinguishers from impossible differ- ential ones. In this paper, we discuss the validity of the assumptions made in the computation of the improbable differential probabilities. In particular, we show based on experiments that such improbable differ- ential cryptanalysis can fail. The validity of the improbable differential cryptanalyses on PRESENT and CLEFIA is discussed. Keywords:improbable differential, impossible differential, truncated differential, PRESENT, CLEFIA 1 Introduction Since the introduction of differential cryptanalysis [2] in the beginning of the 90's, many generalizations of this attack have been proposed to cryptanalyse a large number of block ciphers. While most of them exploit differentials with high probability, in the impossible differential cryptanalysis context [1] attackers take advantage of zero-probability differentials. Recently a variation of this attack called improbable differential cryptanalysis have been introduced by Tezcan [21] at Indocrypt 2010 and by Mala, Dakhilalian and Shakiba [15]. In this context, differentials with low probabilities are used to distinguish the cipher from a random permutation. While in theory this attack could be efficient on some ciphers, in practice, it may be hard to find differentials or truncated differentials with such small prob- abilities.
    [Show full text]
  • Land Tenure (To the End of the Ptolemaic Period)
    LAND TENURE (T O THE END OF THE PTOLEMAIC PERIOD ) زة ارا ( ا ا) Sally L. D. Katary EDITORS WILLEKE WENDRICH Editor-in-Chief University of California, Los Angeles JACCO DIELEMAN Editor University of California, Los Angeles JUAN CARLOS MORENO GARCÍA Area Editor Individual and Society Université Charles-de-Gaulle ELIZABETH FROOD Editor University of Oxford JOHN BAINES Senior Editorial Consultant University of Oxford Short Citation: Katary, 2012, Land Tenure (to the End of the Ptolemaic Period). UEE . Full Citation: Katary, Sally, 2012, Land Tenure (to the End of the Ptolemaic Period). In Juan Carlos Moreno García, Willeke Wendrich (eds.), UCLA Encyclopedia of Egyptology , Los Angeles. http://digital2.library.ucla.edu/viewItem.do?ark=21198/zz002bfks5 8007 Version 1, March 2012 http://digital2.library.ucla.edu/viewItem.do? ark=21198/zz002bfks5 LAND TENURE (TO THE END OF THE PTOLEMAIC PERIOD ) زة ارا ( ا ا) Sally L. D. Katary Feldereinteilung (bis zum Ende der Ptolemäerzeit) Le régime de la propriété foncière (jusqu’à la fin de la période ptolémaïque) Land tenure describes the regime by means of which land is owned or possessed, whether by landholders, private owners, tenants, sub-lessees, or squatters. It embraces individual or group rights to occupy and/or use the land, the social relationships that may be identified among the rural population, and the converging influences of the local and central power structures. Features in the portrait of ancient Egyptian land tenure that may be traced over time in response to changing configurations of government include state and institutional landownership, private smallholdings, compulsory labor (corvée), cleruchies, leasing, and tenancy.
    [Show full text]
  • The Improbable Differential Attack: Cryptanalysis of Reduced Round
    The Improbable Differential Attack: Cryptanalysis of Reduced Round CLEFIA? Cihangir Tezcan Ecole´ Polytechnique F´ed´eralede Lausanne EDOC-IC BC 350 Station 14 CH-1015 Lausanne, Switzerland [email protected] Abstract. In this paper we present a new statistical cryptanalytic tech- nique that we call improbable differential cryptanalysis which uses a dif- ferential that is less probable when the correct key is used. We provide data complexity estimates for this kind of attacks and we also show a method to expand impossible differentials to improbable differentials. By using this expansion method, we cryptanalyze 13, 14, and 15-round CLEFIA for the key sizes of length 128, 192, and 256 bits, respectively. These are the best cryptanalytic results on CLEFIA up to this date. Keywords : Cryptanalysis, Improbable differential attack, CLEFIA 1 Introduction Statistical attacks on block ciphers make use of a property of the cipher so that an incident occurs with different probabilities depending on whether the correct key is used or not. For instance, differential cryptanalysis [1] considers characteristics or differentials which show that a particular out- put difference should be obtained with a relatively high probability when a particular input difference is used. Hence, when the correct key is used, the predicted differences occur more frequently. In a classical differen- tial characteristic the differences are fully specified and in a truncated differential [2] only parts of the differences are specified. On the other hand, impossible differential cryptanalysis [3] uses an impossible differential which shows that a particular difference cannot occur for the correct key (i.e. probability of this event is exactly zero).
    [Show full text]
  • Cwiek, Andrzej. Relief Decoration in the Royal
    Andrzej Ćwiek RELIEF DECORATION IN THE ROYAL FUNERARY COMPLEXES OF THE OLD KINGDOM STUDIES IN THE DEVELOPMENT, SCENE CONTENT AND ICONOGRAPHY PhD THESIS WRITTEN UNDER THE SUPERVISION OF PROF. KAROL MYŚLIWIEC INSTITUTE OF ARCHAEOLOGY FACULTY OF HISTORY WARSAW UNIVERSITY 2003 ACKNOWLEDGMENTS This work would have never appeared without help, support, advice and kindness of many people. I would like to express my sincerest thanks to: Professor Karol Myśliwiec, the supervisor of this thesis, for his incredible patience. Professor Zbigniew Szafrański, my first teacher of Egyptian archaeology and subsequently my boss at Deir el-Bahari, colleague and friend. It was his attitude towards science that influenced my decision to become an Egyptologist. Professor Lech Krzyżaniak, who offered to me really enormous possibilities of work in Poznań and helped me to survive during difficult years. It is due to him I have finished my thesis at last; he asked me about it every time he saw me. Professor Dietrich Wildung who encouraged me and kindly opened for me the inventories and photographic archives of the Ägyptisches Museum und Papyrussammlung, and Dr. Karla Kroeper who enabled my work in Berlin in perfect conditions. Professors and colleagues who offered to me their knowledge, unpublished material, and helped me in various ways. Many scholars contributed to this work, sometimes unconsciously, and I owe to them much, albeit all the mistakes and misinterpretations are certainly by myself. Let me list them in an alphabetical order, pleno titulo: Hartwig
    [Show full text]
  • Early Dynastic Egypt
    EARLY DYNASTIC EGYPT EARLY DYNASTIC EGYPT Toby A.H.Wilkinson London and New York First published 1999 by Routledge 11 New Fetter Lane, London EC4P 4EE Simultaneously published in the USA and Canada by Routledge 29 West 35th Street, New York, NY 10001 Routledge is an imprint of the Taylor & Francis Group This edition published in the Taylor & Francis e-Library, 2005. © 1999 Toby A.H.Wilkinson All rights reserved. No part of this book may be reprinted or reproduced or utilised in any form or by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying and recording, or in any information storage or retrieval system, without permission in writing from the publishers. British Library Cataloguing in Publication Data A catalogue record for this book is available from the British Library. Library of Congress Cataloguing in Publication Data Wilkinson, Toby A.H. Early Dynastic Egypt/Toby A.H.Wilkinson p. cm. Includes bibliographical references (p.378) and index. 1. Egypt—History—To 332 B.C. I. Title DT85.W49 1999 932′.012–dc21 98–35836 CIP ISBN 0-203-02438-9 Master e-book ISBN ISBN 0-203-20421-2 (Adobe e-Reader Format) ISBN 0-415-18633-1 (Print Edition) For Benjamin CONTENTS List of plates ix List of figures x Prologue xii Acknowledgements xvii PART I INTRODUCTION 1 Egyptology and the Early Dynastic Period 2 2 Birth of a Nation State 23 3 Historical Outline 50 PART II THE ESTABLISHMENT OF AUTHORITY 4 Administration 92 5 Foreign Relations 127 6 Kingship 155 7 Royal Mortuary Architecture 198 8 Cults and
    [Show full text]
  • A Brief Outlook at Block Ciphers
    A Brief Outlook at Block Ciphers Pascal Junod Ecole¶ Polytechnique F¶ed¶eralede Lausanne, Suisse CSA'03, Rabat, Maroc, 10-09-2003 Content F Generic Concepts F DES / AES F Cryptanalysis of Block Ciphers F Provable Security CSA'03, 10 septembre 2003, Rabat, Maroc { i { Block Cipher P e d P C K K CSA'03, 10 septembre 2003, Rabat, Maroc { ii { Block Cipher (2) F Deterministic, invertible function: e : {0, 1}n × K → {0, 1}n d : {0, 1}n × K → {0, 1}n F The function is parametered by a key K. F Mapping an n-bit plaintext P to an n-bit ciphertext C: C = eK(P ) F The function must be a bijection for a ¯xed key. CSA'03, 10 septembre 2003, Rabat, Maroc { iii { Product Ciphers and Iterated Block Ciphers F A product cipher combines two or more transformations in a manner intending that the resulting cipher is (hopefully) more secure than the individual components. F An iterated block cipher is a block cipher involving the sequential repeti- tion of an internal function f called a round function. Parameters include the number of rounds r, the block bit size n and the bit size k of the input key K from which r subkeys ki (called round keys) are derived. For invertibility purposes, the round function f is a bijection on the round input for each value ki. CSA'03, 10 septembre 2003, Rabat, Maroc { iv { Product Ciphers and Iterated Block Ciphers (2) P K f k1 f k2 f kr C CSA'03, 10 septembre 2003, Rabat, Maroc { v { Good and Bad Block Ciphers F Flexibility F Throughput F Estimated Security Level CSA'03, 10 septembre 2003, Rabat, Maroc { vi { Data Encryption Standard (DES) F American standard from (1976 - 1998).
    [Show full text]
  • Illuminating the Path of Darkness
    ILLUMINATING THE PATH OF DARKNESS: Social and sacred power of artificial light in Pharaonic Period Egypt This thesis is submitted for the degree of Doctor of Philosophy Meghan E. Strong Girton College University of Cambridge January 2018 Illuminating the path of darkness: social and sacred power of artificial light in Pharaonic Period Egypt Meghan E. Strong ABSTRACT Light is seldom addressed in archaeological research, despite the fact that, at least in ancient Egypt, it would have impacted upon all aspects of life. When discussing light in Egyptology, the vast majority of scholarly attention is placed on the sun, the primary source of illumination. In comparison, artificial light receives very little attention, primarily due to a lack of archaeological evidence for lighting equipment prior to the 7th century BC. However, 19th and 20th century lychnological studies have exaggerated this point by placing an overwhelming emphasis on decorated lamps from the Greco-Roman Period. In an attempt to move beyond these antiquarian roots, recent scholarship has turned towards examining the role that light, both natural and artificial, played in aspects of ancient societies’ architecture, ideology and religion. The extensive body of archaeological, textual and iconographic evidence that remains from ancient Egypt is well suited to this type of study and forms three core data sets in this thesis. Combining a materials- based examination of artificial light with a contextualized, theoretical analysis contributes to a richer understanding of ancient Egyptian culture from the 3rd to 1st millennium BC. The first three chapters of this study establish a typology of known artificial lighting equipment, as well as a lexicon of lighting terminology.
    [Show full text]