See the Pyramids Along the Nile
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Block Ciphers and the Data Encryption Standard
Lecture 3: Block Ciphers and the Data Encryption Standard Lecture Notes on “Computer and Network Security” by Avi Kak ([email protected]) January 26, 2021 3:43pm ©2021 Avinash Kak, Purdue University Goals: To introduce the notion of a block cipher in the modern context. To talk about the infeasibility of ideal block ciphers To introduce the notion of the Feistel Cipher Structure To go over DES, the Data Encryption Standard To illustrate important DES steps with Python and Perl code CONTENTS Section Title Page 3.1 Ideal Block Cipher 3 3.1.1 Size of the Encryption Key for the Ideal Block Cipher 6 3.2 The Feistel Structure for Block Ciphers 7 3.2.1 Mathematical Description of Each Round in the 10 Feistel Structure 3.2.2 Decryption in Ciphers Based on the Feistel Structure 12 3.3 DES: The Data Encryption Standard 16 3.3.1 One Round of Processing in DES 18 3.3.2 The S-Box for the Substitution Step in Each Round 22 3.3.3 The Substitution Tables 26 3.3.4 The P-Box Permutation in the Feistel Function 33 3.3.5 The DES Key Schedule: Generating the Round Keys 35 3.3.6 Initial Permutation of the Encryption Key 38 3.3.7 Contraction-Permutation that Generates the 48-Bit 42 Round Key from the 56-Bit Key 3.4 What Makes DES a Strong Cipher (to the 46 Extent It is a Strong Cipher) 3.5 Homework Problems 48 2 Computer and Network Security by Avi Kak Lecture 3 Back to TOC 3.1 IDEAL BLOCK CIPHER In a modern block cipher (but still using a classical encryption method), we replace a block of N bits from the plaintext with a block of N bits from the ciphertext. -
The History of Ancient Egypt “Passionate, Erudite, Living Legend Lecturers
“Pure intellectual stimulation that can be popped into Topic Subtopic the [audio or video player] anytime.” History Ancient History —Harvard Magazine The History of Ancient Egypt “Passionate, erudite, living legend lecturers. Academia’s best lecturers are being captured on tape.” —The Los Angeles Times The History “A serious force in American education.” —The Wall Street Journal of Ancient Egypt Course Guidebook Professor Bob Brier Long Island University Professor Bob Brier is an Egyptologist and Professor of Philosophy at the C. W. Post Campus of Long Island University. He is renowned for his insights into ancient Egypt. He hosts The Learning Channel’s popular Great Egyptians series, and his research was the subject of the National Geographic television special Mr. Mummy. A dynamic instructor, Professor Brier has received Long Island University’s David Newton Award for Teaching Excellence. THE GREAT COURSES® Corporate Headquarters 4840 Westfields Boulevard, Suite 500 Chantilly, VA 20151-2299 Guidebook USA Phone: 1-800-832-2412 www.thegreatcourses.com Cover Image: © Hemera/Thinkstock. Course No. 350 © 1999 The Teaching Company. PB350A PUBLISHED BY: THE GREAT COURSES Corporate Headquarters 4840 Westfi elds Boulevard, Suite 500 Chantilly, Virginia 20151-2299 Phone: 1-800-TEACH-12 Fax: 703-378-3819 www.thegreatcourses.com Copyright © The Teaching Company, 1999 Printed in the United States of America This book is in copyright. All rights reserved. Without limiting the rights under copyright reserved above, no part of this publication may be reproduced, stored in or introduced into a retrieval system, or transmitted, in any form, or by any means (electronic, mechanical, photocopying, recording, or otherwise), without the prior written permission of The Teaching Company. -
Egypt. the Last Centuries of the Empire (747–332 Bce)
EGYPT. THE LAST CENTURIES OF THE EMPIRE (747–332 BCE) S u m m a r y The book “Egypt. The Last Centuries of the Empire (747–332 BCE)” deals with issues related to the political and social history of Egypt in the period between the beginning of the rule of the Kushite pharaohs and Alexander the Great’s conquest of Egypt. The book comprises an introduction, ten chapters, a conclusion, three appen- dices and a bibliography. The introduction leads the reader into relevant issues and remarks on the accepted convention of providing names and a chronological table. Chapter 1 ( The Napatan Dynasty ) discusses the history of the Kushite family reign and the Kushite conquest of Egypt (25 th Dynasty). Chapter 2 ( Regarding God’s Wife of Amun ) focus- es on the rule of successive Napatan rulers (Shebitku, Shabaka), the role of God’s Wife of Amun in the ideology of royal rulers in the Late Period, and also on the 19th-century research conducted by Count Michał Tyszkiewicz in the vicinity of the tombs of God’s Wives and their Kushite courtiers. Chapter 3 ( Assyrians at the Gates ) discusses the reigns of Egypt’s last Kushite pharaohs. Chapter 4 ( The Golden Age ) summarises the first years of the 26 th Dynasty and changes initiated by its founder, Psametik I. In Chapter 5 ( Naucratis and the Sunken City ), there is a discussion of discoveries: Flinders Petrie’s discovery of Naucratis and Franck Goddio’s of Thonis- Heracleion, and also of the history of the 26 th Dynasty rulers (Necho II, Psametik II) and their relations with the Greek world. -
Related-Key Cryptanalysis of 3-WAY, Biham-DES,CAST, DES-X, Newdes, RC2, and TEA
Related-Key Cryptanalysis of 3-WAY, Biham-DES,CAST, DES-X, NewDES, RC2, and TEA John Kelsey Bruce Schneier David Wagner Counterpane Systems U.C. Berkeley kelsey,schneier @counterpane.com [email protected] f g Abstract. We present new related-key attacks on the block ciphers 3- WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA. Differen- tial related-key attacks allow both keys and plaintexts to be chosen with specific differences [KSW96]. Our attacks build on the original work, showing how to adapt the general attack to deal with the difficulties of the individual algorithms. We also give specific design principles to protect against these attacks. 1 Introduction Related-key cryptanalysis assumes that the attacker learns the encryption of certain plaintexts not only under the original (unknown) key K, but also under some derived keys K0 = f(K). In a chosen-related-key attack, the attacker specifies how the key is to be changed; known-related-key attacks are those where the key difference is known, but cannot be chosen by the attacker. We emphasize that the attacker knows or chooses the relationship between keys, not the actual key values. These techniques have been developed in [Knu93b, Bih94, KSW96]. Related-key cryptanalysis is a practical attack on key-exchange protocols that do not guarantee key-integrity|an attacker may be able to flip bits in the key without knowing the key|and key-update protocols that update keys using a known function: e.g., K, K + 1, K + 2, etc. Related-key attacks were also used against rotor machines: operators sometimes set rotors incorrectly. -
The New Zork Times Dark – Carry a Lamp VOL
“All the Grues New Zork Area Weather: That Fit, We Print” The New Zork Times Dark – carry a lamp VOL. 3. .No. 1 WINTER 1984 INTERNATIONAL EDITION SORCERER HAS THE MAGIC TOUCH InfoNews Roundup New Game! Hint Booklets Sorcerer, the second in the In December, Infocom's long- Enchanter series of adventures in the awaited direct mail operation got mystic arts, is now available. The underway. Many of the functions game was written by Steve formerly provided by the Zork Users Meretzky, whose hilarious science Group were taken over by Infocom. fiction game, Planetfall, was named Maps and InvisiClues hint booklets by InfoWorld as the Best Adventure were produced for all 10 of Game of 1983. In Sorcerer, you are a Infocom's products. The games member of the prestigious Circle of themselves were also made available Enchanters, a position that you primarily as a service to those of you achieved in recognition of your in remote geographical areas and to success in defeating the Warlock those who own the less common Krill in Enchanter. computer systems. When the game starts, you realize Orders are processed by the that Belboz, the Eldest of the Circle, Creative Fulfillment division of the and the most powerful Enchanter in DM Group, one of the most the land, has disappeared. Perhaps he respected firms in direct mail. Their has just taken a vacation, but it facilities are in the New York metro- wouldn't be like him to leave without politan area, which explains the letting you know. You remember strange addresses and phone num- that he has been experimenting with bers you'll see on the order forms. -
Chapter 3 – Block Ciphers and the Data Encryption Standard
Symmetric Cryptography Chapter 6 Block vs Stream Ciphers • Block ciphers process messages into blocks, each of which is then en/decrypted – Like a substitution on very big characters • 64-bits or more • Stream ciphers process messages a bit or byte at a time when en/decrypting – Many current ciphers are block ciphers • Better analyzed. • Broader range of applications. Block vs Stream Ciphers Block Cipher Principles • Block ciphers look like an extremely large substitution • Would need table of 264 entries for a 64-bit block • Arbitrary reversible substitution cipher for a large block size is not practical – 64-bit general substitution block cipher, key size 264! • Most symmetric block ciphers are based on a Feistel Cipher Structure • Needed since must be able to decrypt ciphertext to recover messages efficiently Ideal Block Cipher Substitution-Permutation Ciphers • in 1949 Shannon introduced idea of substitution- permutation (S-P) networks – modern substitution-transposition product cipher • These form the basis of modern block ciphers • S-P networks are based on the two primitive cryptographic operations we have seen before: – substitution (S-box) – permutation (P-box) (transposition) • Provide confusion and diffusion of message Diffusion and Confusion • Introduced by Claude Shannon to thwart cryptanalysis based on statistical analysis – Assume the attacker has some knowledge of the statistical characteristics of the plaintext • Cipher needs to completely obscure statistical properties of original message • A one-time pad does this Diffusion -
Specular Reflection from the Great Pyramid at Giza
Specular Reflection from the Great Pyramid at Giza Donald E. Jennings Goddard Space Flight Center, Greenbelt, Maryland, USA (retired) email: [email protected] Posted to arXiv: physics.hist-ph April 6, 2021 Abstract The pyramids of ancient Egypt are said to have shone brilliantly in the sun. Surfaces of polished limestone would not only have reflected diffusely in all directions, but would also likely have produced specular reflections in particular directions. Reflections toward points on the horizon would have been visible from large distances. On a particular day and time when the sun was properly situated, an observer stationed at a distant site would have seen a momentary flash as the sun’s reflection moved across the face of the pyramid. The positions of the sun that are reflected to the horizon are confined to narrow arcs in the sky, one arc for each side of the pyramid. We model specular reflections from the pyramid of Khufu and derive the annual dates and times when they would have been visible at important ancient sites. Certain of these events might have coincided with significant dates on the Egyptian calendar, as well as with solar equinoxes, solstices and cross-quarter days. The celebration of Wepet-Renpet, which at the time of the pyramid’s construction occurred near the spring cross-quarter day, would have been marked by a specular sweep of sites on the southern horizon. On the autumn and winter cross-quarter days reflections would have been directed to Heliopolis. We suggest that on those days the pyramidion of Khafre might have been visible in specular reflection over the truncated top of Khufu’s pyramid. -
A Short History of Egypt – to About 1970
A Short History of Egypt – to about 1970 Foreword................................................................................................... 2 Chapter 1. Pre-Dynastic Times : Upper and Lower Egypt: The Unification. .. 3 Chapter 2. Chronology of the First Twelve Dynasties. ............................... 5 Chapter 3. The First and Second Dynasties (Archaic Egypt) ....................... 6 Chapter 4. The Third to the Sixth Dynasties (The Old Kingdom): The "Pyramid Age"..................................................................... 8 Chapter 5. The First Intermediate Period (Seventh to Tenth Dynasties)......10 Chapter 6. The Eleventh and Twelfth Dynasties (The Middle Kingdom).......11 Chapter 7. The Second Intermediate Period (about I780-1561 B.C.): The Hyksos. .............................................................................12 Chapter 8. The "New Kingdom" or "Empire" : Eighteenth to Twentieth Dynasties (c.1567-1085 B.C.)...............................................13 Chapter 9. The Decline of the Empire. ...................................................15 Chapter 10. Persian Rule (525-332 B.C.): Conquest by Alexander the Great. 17 Chapter 11. The Early Ptolemies: Alexandria. ...........................................18 Chapter 12. The Later Ptolemies: The Advent of Rome. .............................20 Chapter 13. Cleopatra...........................................................................21 Chapter 14. Egypt under the Roman, and then Byzantine, Empire: Christianity: The Coptic Church.............................................23 -
FSF #4 Low Res
Bulletin 1, January, 2015 Bulletin 4, October, 2015 North Africa Horizons NorthNorth AfricaAfrica HorizonsHorizons A monitoring bulletinA monitoring published bulletin by FSF published (Futures by Studies FSF (Futures Forum Studiesfor Africa Forum and the for MiddleAfrica and East) the Middle East) Future of North Africa's Slums: "Slums ofSECURING Hope" or "Slums of Despair"? WHEAT AVAILABILITY What Prospects for North Africa? http://www.foresightfordevelopment.org/fsf/all-pages http://www.foresightfordevelopment.org/fsf/all-pages Contents Introduction 1 Editorial 2 Urbanization and Future Prospects of Slums in NA 5 The Slum Economy:The Base of the Pyramid that Holds The Formal City 14 Building Resilience of Slum Communities 22 Future of North Africa's Slums: "Slums of Hope" or "Slums of Despair"? Introduction For decades, urbanization was probably the most visible future trend and the easiest to forecast. We now know that the future is urban and glimpses of the future can be seen already in North Africa (NA), where some countries are over 80% urbanized. However, the nature of this future is contested. While urban planners look to Dubai and other shiny cities as the model for the future, the realities are very different as most cities in NA have already formed their character; and to many this portrait is ugly and dysfunctional. Indeed many cities are teaming with slums and despite concerted efforts over the years to rid NA cities of slums, they continue to be pervasive future of the city. Slums are the entry point to address the cities’ challenges and there is a need to realize that as long as the urbanization process continues there will never be enough resources to provide decent housing for all. -
Sphinx Sphinx
SPHINX SPHINX History of a Monument CHRISTIANE ZIVIE-COCHE translated from the French by DAVID LORTON Cornell University Press Ithaca & London Original French edition, Sphinx! Le Pen la Terreur: Histoire d'une Statue, copyright © 1997 by Editions Noesis, Paris. All Rights Reserved. English translation copyright © 2002 by Cornell University All rights reserved. Except for brief quotations in a review, this book, or parts thereof, must not be reproduced in any form without permission in writing from the publisher. For information, address Cornell University Press, Sage House, 512 East State Street, Ithaca, New York 14850. First published 2002 by Cornell University Press Printed in the United States of America Library of Congress Cataloging-in-Publication Data Zivie-Coche, Christiane. Sphinx : history of a moument / Christiane Zivie-Coche ; translated from the French By David Lorton. p. cm. Includes bibliographical references and index. ISBN 0-8014-3962-0 (cloth : alk. paper) 1. Great Sphinx (Egypt)—History. I.Tide. DT62.S7 Z58 2002 932—dc2i 2002005494 Cornell University Press strives to use environmentally responsible suppliers and materials to the fullest extent possible in the publishing of its books. Such materi als include vegetable-based, low-VOC inks and acid-free papers that are recycled, totally chlorine-free, or partly composed of nonwood fibers. For further informa tion, visit our website at www.cornellpress.cornell.edu. Cloth printing 10 987654321 TO YOU PIEDRA en la piedra, el hombre, donde estuvo? —Canto general, Pablo Neruda Contents Acknowledgments ix Translator's Note xi Chronology xiii Introduction I 1. Sphinx—Sphinxes 4 The Hybrid Nature of the Sphinx The Word Sphinx 2. -
THE MUMMY CASE Elizabeth Peters
THE MUMMY CASE Peabody Book 03 Elizabeth Peters After the death of the author of these memoirs (of which this is the third volume to appear), her heirs felt that her animated (if biased) descriptions of the early days of excavation in Egypt should not be kept from historians of that period. Since certain episodes involve matters that might embarrass the descendants of the participants therein (and possibly render publisher and editor subject to legal action), it was agreed that the memoirs should appear in the guise of fiction. A certain amount of judicious editing was done, and many of the names were changed, including that of Mrs. "Emerson." However, in recent years rumors have circulated regarding the accuracy of these works and the identity of their author— originated, we suspect, by disaffected members of Mrs. "Emerson's" family, who resent their exclusion from the financial proceeds (modest though they are) of the works in question. The editor therefore wishes to disclaim all responsibility for, first, the opinions expressed herein, which are those of the late lamented Mrs. "Emerson"; and second, certain minor errors of fact, which are due in part to Mrs. "Emerson's" faulty memory and in even larger part to her personal eccentricities and prejudices. The editor also wishes to apologize for the stylistic peculiarities of this foreword, which seems to have been unconsciously influenced by the literary style of Mrs. "Emerson." She would no doubt be pleased at such a demonstration of the influence she continues to exert on those who were affected by it during her long and vigorous life. -
Jay Simon 3/18/2002 STS 145 Case Study Zork: a Study of Early
Jay Simon 3/18/2002 STS 145 Case Study Zork: A Study of Early Interactive Fiction I: Introduction If you are a fan of interactive fiction, or have any interest in text-based games from the early 1980’s, then you are no doubt familiar with a fascinating series known as Zork. For the other 97 percent of the population, the original Zork games are text-based adventures in which the player is given a setting, and types in a command in standard English. The command is processed, and sometimes changes the state of the game. This results in a new situation that is then communicated to the user, restarting the cycle. This type of adventure game is classified as belonging to a genre called “interactive fiction”. Zork is exceptional in that the early Zork games are by far the most popular early interactive fiction titles ever released. It is interesting to examine why these games sold so well, while most other interactive fiction games could not sell for free in the 1980’s. As we will see, this is a result of many different technological and stylistic aspects of Zork that separate it from the rest of the genre. Zork is a unique artifact in gaming history. II: MIT and Infocom – The Prehistory of Zork Zork was not a modern project developed under a strict timeline by a designated team of programmers, but credit is given to two MIT phenoms named Marc Blank and Dave Lebling. Its history can be traced all the way back to the invention of a medium-sized machine called the PDP-10, in the 1960’s.