Monday, January 27, 2020

Cryptography: Theories, Functions and Strategies

Cryptography: Theories, Functions and Strategies Abstract Digital signing is a mechanism for certifying the origin and the integrity of electronically transmitted information. In the process of digitally signing, additional information called a digital signature is added to the given document, calculated using the contents of the document and some private key. At a later stage, this information can be used to check the origin of the signed document. The mathematical base of the digital signing of documents is public key cryptography. This work presents the theory behind digital signatures, signature schemes and attacks on signatures and provides a survey of application areas of the digital signing technology. Moreover, there are lab exercises developed in Mathlab, to reinforce the understanding of this technology. 1. Introduction The Concise Oxford Dictionary (2006) defines cryptography as the art of writing or solving codes, however modern cryptography does not met this definition. Therefore, this work starts with a literature review defining some key concepts, like what cryptography and cryptographic system are and the different types of cryptographic system are presented. The other interesting and preliminary concept is the notion of cryptosystem functions which are also discussed in the introductory section. Furthermore, it is stated that public-key encryption represents a revolution in the field of cryptography, and this work poses some basic definitions on this topic trying to explain the theory behind. The rest of the literature review is concentrated on public key cryptography and it focuses on the theory behind digital signatures, signature schemes and attacks on signatures. And finally, the literature review presents a survey of application areas on digital signatures. One part of the contribution of this work, is an overview of the secure hash standard (SHS) and implementation of the secure hash algorithm (SHA-1), required for use with digital signature algorithms. The main part though, is the implementation of AES and RSA by utilizing Mathlab. The code of all these implementations is thoroughly discussed and explained in this work. Moreover, a comparison is also presented subsequently. 2. Cryptography The Greek words â€Å"krypt ´os† standing for â€Å"hidden† and the word â€Å"l ´ogos† that means â€Å"word†, are in essence the base from where the word cryptology was derived. As these words denote, cryptology can be best explained by the meaning â€Å"hidden word†. In this context, the original purpose behind cryptology is hiding the meaning of some specific combination of words which in turn would insure secrecy and confidentiality. This is a very limited viewpoint in today’s perspective and a wide range of security applications and issues now come under the term of cryptology (rest of the portion of this section will clarify this point of view). As field of mathematical science, Cryptology includes the study of both cryptanalysis as well as cryptography. On one hand, cryptography is a very broad term and represents any process used for data protection. On the other hand, the study of security related issues and the probabilities of breaking the cryptographic systems and a technique is known as cryptanalysis. By making reference to (Shirey, 2000), the field cryptanalysis can be best described as the â€Å"mathematical science that deals with analysis of a cryptographic system in order to gain knowledge needed to break or circumvent the protection that the system is designed to provide.† In simple words, cryptanalyst can be regarded as the opponent of the cryptographer i.e. he/she has to get around the security which cryptographer devised on his/her part. (Buchmann, 2004) claims that a cryptographic system (or in short a cryptosystem) describes â€Å"a set of cryptographic algorithms together with the key management processes that support use of the algorithms in some application context.† This is a diverse explanation that includes all sorts of cryptographic algorithms as well as protocols. However, hidden parameters like cryptographic keys may or may not be used by a cryptographic system (Delfs, 2007). Similarly, participants of the undergoing communication may or may not share those secret parameters. Thus, cryptographic can be classified into following three types: a cryptographic system in which no secret parameters are employed (called an un-keyed cryptosystem); a cryptosystem which makes use of secret parameters and at the same time shares the parameters between the participants (known as a secret key cryptographic system); and a system that utilizes the secret parameters, but not sharing them with the participants (call ed a public key cryptographic system) (Shirey, 2000; Buchmann, 2004). Cryptography aims at designing and implementing cryptographic systems and utilizing such systems which are secure effectively. The first a formal definition about the term cryptography dates from relatively past time. Back then, the approach known by the name â€Å"security through obscurity† was being used (Dent, 2004). There are a lot of examples based on this approach by which security of the system was improved by keeping internal working and design secret. Majority of those systems do not serve the purpose and security may well be violated. The Kerckhoffs’ principle is a very famous cryptographic principle which states that (Kerckhoffs, 1883): â€Å"Except for parameters clearly defined to be secret, like the cryptographic keys, a cryptosystem must be designed in such a way as to be secure even with the case that the antagonist knows all details about the system†. However, it might be noted that one important aspect is that a cryptosystem is perfectly securing theoretically grounds, but it may not remain the same when implemented practically. Different possibilities of generating attacks on security of such systems can arise while having the practical implementation (Anderson, 1994). Attacks which make use of exploitation of side channel information are the examples of such attacks. If a cryptosystem is executed, it can result in the retrieval of side channel information with unspecified inputs and outputs (Anderson, 1994). In encryption systems, the input is plaintext message plus the key, while the specific output is the cipher text. Thus, there are chances on information leakage. Power consumption, timing characteristics along with the radiation of all types are some examples in this regard. On the other hand, side channel attacks are the types of network attacks which extract side channel information. Since the mid 1990s there were many di fferent possibilities have been found by the researchers in order to build up side channel attacks. A few examples in this regard are the differential power analysis (Bonehl, 1997), and fault analysis (Biham, 1997; Kocher, 1999) as well as the timing attacks (Kocher, 1996). It is a very practical statement that any computation performed on real computer systems represents some physical phenomena which can be examined and analyzed to provide information regarding the keying material being employed. Cryptography does not help to cope with this situation because of the inherent nature of this problem. 2.1 Cryptosystem functions Other than the usual random bit generators as well as the hash functions, there are no secret parameters that are used in cryptosystem functions. These are the junketed functions that characterize the cryptographic system functions. In cryptographic functions, the elements used are usually one-way and it is difficult or almost impossible to invert them. This follows that it is easy to compute a cryptographic function whereas it is hard to invert the functions and also to compute the results of the relationships (Kerckhoffs, 1883). It is difficult to apply any mathematical method for inverting the cryptographic system functions in a way that will be coherent and meaningful. For example, a cryptographic system functions such as F: X → Y is easy to comfortably use mathematical knowledge to compute while it is hard to use the same to invert (Buchmann, 2004; Shirey, 2000). There are many examples of one-way functions that we can use to demonstrate the meaning of the cryptosystems. In a situation where one has stored numbers on the cell phone, computation of the same is possible and easy due to the fact that the names are stored in an alphabetical manner (Garrett, 2001). If one inverts the relationship of these functions, it will be impossible to compute because the numbers are not arranged numerically in the storage phonebook. It is notable that a lot of other things that we do in daily life are comparable to cryptosystem function in the sense that you cannot invert or undo them. For example, if one breaks a glass, the process is one way because it is not possible for these pieces to be restored together again (Goldreich, 2004). Similarly, when one drops something into water, it is not practically possible to reverse the action of dropping this item (Mao, 2003). The English corresponding action would be to un-drop the item as opposed to picking it. Cry ptosystem functions cannot be demonstrated as purely one-way and this is the branching point between cryptosystem functions and the real world of things and circumstances. The only one-way functions in mathematics can be exemplified by discrete exponentiation, modular power and modular square functions. Public key cryptography uses these functions in its operations but it has not been well documented whether they are really one-way or not. There has been debate in practice whether one-way functions really exist in the first place or not (Garrett, 2001). In the recent day cryptographic discussions a lot of care should be applied when referring to the one-way functions so as not to interfere or make false claims to the functional attributes of these parameters. There is a need to look for extra information and knowledge concerning one-way functions so that efficient and meaningful inversions are possible and mathematically coherent. Therefore, functions such as F: X → Y is considered to be a one-way function (Koblitz, 1994; Schneier, 1996). This follows that if F can successfully and coherently inverted, the need for extra information is needed. This will hence bring the notion of the meaning of the other parameters in relation to F. Computer science uses the hash functions in its operations. This is because these functions are computable and generates output dependent on the input that was used (Katz, 2007; Koblitz, 1994). 3. Digital signatures The public-key encryption presents a revolution in the field of cryptography and until its invention the cryptographers had relied completely on common, secret keys in order to achieve confidential communication (Smart, 2003). On the contrary, the public-key techniques, allow for the parties to communicate privately without the requirement to decide on a secret key in advance. While the concept of private-key cryptography is presented as two parties agree on a secret keyk which can be used (by either party) for both encryption and decryption; public-key encryption is asymmetric in both these respects (Stinson, 2005). Namely, in public-key encryption: One party (the receiver) generates a pair of keys (pk, sk), where pk is called the public key and ps is the private key, The public key is used by a sender to encrypt a message for the receiver, and The receiver uses the private key to decrypt that message. There three parts of information form part of public key certificate: Some naming information A Public key Digital signatures (this can be one or more) Encryptions and digital signatures were introduced to make the web transactions secure and manageable. The use of cryptographic techniques was applied to enhance and provide security layer such that the encrypted information and files would remain secure and confidential. Very frequently, a digital signature is mistaken with the inverse of a public-key encryption, but this is not entirely true. In the history, a digital signature could be obtained by reversing, but today in the majority of the situations this process would be impossible to be performed. Basically, a digital signature is a form of a mathematical scheme for signifying the genuineness of a digital message. A valid digital signature would provide a proof to the person that receives the message or the document that these information is indeed created by a specified sender. Moreover, it would prove that message or the document was not altered during the transportation. Digital signatures are usually used for software distribution or mainly money transactions, where it is very important to detect the possibility of forgery. As a part of the field in asymmetric cryptography, it might be noted that a digital signature is somehow equivalent of the traditional handwritten signatures. On the other hand, in order to be effective, a digital signature should be correctly implemented. Another very important concept is the notion of non-repudiation. This means that if somebody signs a document by using a digital signature, they can not say that it was not signed by them, even though their private key remains as a secret. On the other hand, there is a time stamp, so that even if the private key of a sender is compromised in future, the digital signature will remain valid. Examples of such messages are: electronic mail contracts messages sent via some cryptographic protocol A digital signature usually is comprised of: An algorithm for producing a key. This algorithm would find a private key by chance from all the possible private keys available. Then it will output that private key with a matching public key. A signing algorithm that, given a message and a private key, produces a signature. A signature authenticating algorithm that, given a message, public key and a signature, it will accept or reject the message. Primary, a signature produced from a fixed message and a private key verifies that the genuineness of that message is ok, by means of the matching public key. Then, it has to be computationally infeasible to make an appropriate signature for a party that doesn’t have the private key 4. Algorithms 4.1. Introduction to SHS This section provides an overview of the secure hash standard (SHS) and implementation of the secure hash algorithm (SHA-1), required for use with digital signature algorithms. SHA-1 is used for computing a compressed version of a message or a data file. If that data has a length smaller than 264 buts, then the output will be 160-bit and is called a message digest. The message digest used for an input to the Digital Signature Algorithm (DSA). This algorithm will verify the signature for the message. Signing the message digest instead of the originall message itself, might advance the effectiveness of the procedure. This is since the message digest is usually much slighter in size than the original message. Very important is that the same hash algorithm should be used by both the verifier and the digital signature creator. The usage of the SHA-1 with the DSA can be presented as follows: Interesting for SHA-1 is that it is computationally impossible to discover a message which matchs to a given digest. Moreover, it is also impossible to find two dissimilar messages which create an identical message digest. 4.2. Implementation of SHA-1 The following functions were implemented for the SHA-1 algorithm: Name of source file: secure_hash_algorithm.m. Function in the source file: secure_hash_algorithm (message). This function takes an input a string of characters. Example: Hello, How are you? How is it going on? Output is the message digest, the hash value of the message. Thus, the hash value of the above message is F418F52AE6DC208599F91191E6C40FA876F33754. Name of source file: arithematic_shift_operations.m. Function in the source file: arithematic_shift_operations (number, position, op). The inputs are: number: it is a hexadecimal large number of any size. The number is represented in base 16 and is stored as a string. Ex: ‘FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF’ position: the number of positions to be shifted by. It is a decimal number in base 10. Op: it is the type of operation done. Inputs are ‘SRA’ -> shift right arithematic and ‘SLA’ -> shift left arithematic. For example, the function: arithematic_shift_operations(‘FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF’, 3, ‘SRA’) would return ‘1FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF’, and arithematic_shift_operations(‘FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF’, 3, ‘SLA’) would return ‘FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF8’. Name of source file: bi2hex.m. Function in the source file: bi2hex (number). The input to this function is a vector of ones and zeros and the result is a hexadecimal output represented in string. For example, for the input â€Å"Number = [1 1 1 1]† bi2hex (Number) returns ‘F’ and for â€Å"Number = [1 1 1 1 0 0 0 1 ]† bi2hex (Number) returns ‘F1’. Name of source file: hex2bi.m. Function in the source file: hex2bi (number). The input to this function is a number stored in form of a string in base 16 and the result is a vector containing the binary representation of input string. For example, for the input â€Å"Number = ‘F’ †, hex2bi (Number) returns â€Å"[1 1 1 1]† and for â€Å"Number = ‘F1’ â€Å", bi2hex (Number) returns â€Å"[1 1 1 1 0 0 0 1]†. Name of source file: hexadecimal_big_number_adder.m. Function in the source file: hexadecimal_big_number_adder (number_one, number_two). The inputs to this function are numbers stored in hexadecimal string format. Output is the result, a hexadecimal string and carry, a decimal number. After using this function, it has to be checked if the carry is generated, Incase if it is generated then the carry has to be appended in the beginning to the result. For example: Number_one = ‘FFFFFFFF’ Number_two = ‘EEEEEEEE’ [result, carry] = hexadecimal_big_number_adder (Number_one, Number_two) Result = ‘EEEEEEED’ , carry = 1; Hence the real sum is Result = strcat(dec2hex(0), Result); this results to ‘1EEEEEEED’ Name of source file: hexadecimal_big_number_subtractor.m. Function in the source file: hexadecimal_big_number_subtractor(number_one, number_two). The inputs to this function are numbers stored in hexadecimal string format. Output is the result, a hexadecimal string and sign, a decimal number. If sign is -1, then the result generated is a negative number else is a positive number. . For example: Number_one= ‘EEEEEEEE’ Number_two= ‘FFFFFFFF’ [result, sign] = hexadecimal_big_number_subtractor(Number_one, Number_two) Result = ‘11111111’ Sign = -1. Name of source file: hexadecimal_big_number_multiprecision_multiplication.m. Function in the source file: hexadecimal_big_number_multiprecision_multiplication(multiplicand, multiplier). The input is a multiplicand stored in string format is a hexadecimal number. And so is multiplier. The output is a result and is stored in form of a string. For example: multiplicand= ‘EEEEEEEE’ multiplier= ‘FFFFFFFF’ hexadecimal_big_number_multiprecision_multiplication(multiplicand, multiplier) result is ‘EEEEEEED11111112’ Name of source file: comparision_of.m. Function in the source file: comparision_of(number_one, number_two, index). This function compares two numbers in hexadecimal format stored in form of strings. Always input index as decimal 1. Therefore, it: Returns 1 if Number_one > Number_two, Returns 0 if Number_one = Number_two, and Returns -1 if Number_one For example, if Number_one= ‘EEEEEEEE’ Number_two= ‘FFFFFFFF’, the result would be: comparision_of(Number_one, Number_two, 1) returns -1. Name of source file: hexadecimal_big_number_modular_exponentiation.m. Function in the source file: hexadecimal_big_number_modular_exponentiation (base, exponent, modulus). This function calculates (power(base, exponent) % modulus). Here the input base, exponent and modulus are hexadecimal strings of any size. For example: Base = ‘FFF’ Exponent = ‘EEE’ Modulus = ‘AAAA’ hexadecimal_big_number_modular_exponentiation (Base, Exponent, Modulus) returns ‘8BAB’ Name of source file: hexadecimal_big_number_multiplicative_inverse.m. Function in the source file: Z = hexadecimal_big_number_multiplicative_inverse(number_one, number_two). This function returns multiplicative inverse of number_two modulo number_one. If az = 1 (mod m) then z is the multiplicative inverse of a mod m. Here â€Å"number_one = m†, â€Å"number_two = a†, â€Å"number_one = ‘FFFF’ †, â€Å"number_two = ‘1235’ â€Å" andresult is ‘634D’, which in turn is the multiplicative inverse of number_two.Hence : (result * number_two) mod number_one = 1 Name of source file: hexadecimal_big_number_test_for_primality.m. Function in the source file: hexadecimal_big_number_test_for_primality(number). The input to this function is an ODD number stored in hexadecimal format as a string. This function returns 1 if the input is a prime and returns -1 if input is composite. Name of source file: power_of_two_conversion_to_hexadecimal.m. Function in the source file: power_of_two_conversion_to_hexadecimal(power). The input is the number, the power to which two has to be raised to. It is a decimal number and the output is a hexadecimal number in form of string. For example, power_of_two_conversion_to_hexadecimal(4) returns ‘10’ i.e 16 in decimal system. Name of source file: hexadecimal_big_number_division.m. Function in the source file: hexadecimal_big_number_division (dividend, divisor). This function returns quotient and remainder both in hexadecimal string format. The inputs to this function are strings of hexadecimal format. This function uses other two functions in turn which are defined in source file Get_multiplier.m, multiplication_by_single_digit_multiplier.m. Name of source file: remove_leading_zeros.m. Function in the source file: remove_leading_zeros (number). This function takes number in hexadecimal string format as input and removes the leading zeros in the string and returns it. For example, if â€Å"Number = ‘000000012345’ â€Å", then the function returns ‘12345’. Some of the most prominent functions are presented in Appendix A. 4.3. Introduction to MD5 The MD5 Message-Digest Algorithm is a extensively utilised in cryptographic hash functions. Basically this is the case for cryptographic hash functions with a 128-bit (16-byte) hash value. MD5 is used in many security applications, and in addition it is frequently used to check data integrity. An MD5 hash is typically expressed as a 32-digit hexadecimal number. The following figure represents a schematic view of the MD5 Message-Digest Algorithm. 4.4. Implementation of MD5 This algorithm would compute MD5 hash function for files. For example, if as input is given the d = md5(FileName), then the function md5() will computes the MD5 hash function of the file specified in the string FileName. This function will returns it as a 64-character array dwhere d is the digest. The following methodology that the MD5 algorithm was implemented: Initially, the function Digestis called. This function would read the whole file, and will make it uint32 vector FileName = C:\md5InputFile.txt [Message,nBits] = readmessagefromfile(FileName); Then, it would append a bit in the last one that was read from that file: BytesInLastInt = mod(nBits,32)/8; if BytesInLastInt Message(end) = bitset(Message(end),BytesInLastInt*8+8); else Message = [Message; uint32(128)]; end Consequetly, it will append the zeros: nZeros = 16 mod(numel(Message)+2,16); Message = [Message; zeros(nZeros,1,uint32)]; And a bit length of the original message as uint64, such as the lower significant uint32 first: Lower32 = uint32(nBits); Upper32 = uint32(bitshift(uint64(nBits),-32)); Message = [Message; Lower32; Upper32]; The 64-element transformation array is: T = uint32(fix(4294967296*abs(sin(1:64)))); The 64-element array of number of bits for circular left shift: S = repmat([7 12 17 22; 5 9 14 20; 4 11 16 23; 6 10 15 21].,4,1); S = S(:).; Finally, the 64-element array of indices into X can be presented as: idxX = [0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 1 6 11 0 5 10 15 4 9 14 3 8 13 2 7 12 5 8 11 14 1 4 7 10 13 0 3 6 9 12 15 2 0 7 14 5 12 3 10 1 8 15 6 13 4 11 2 9] + 1; The initial state of the buffer is consisting of A, B, C and D. such as: A = uint32(hex2dec(67452301)); B = uint32(hex2dec(efcdab89)); C = uint32(hex2dec(98badcfe)); D = uint32(hex2dec(10325476)); The message is reshaped, such as: Message = reshape(Message,16,[]); The look between the blocks, such that X is an extraction of the next block: for iBlock = 1:size(Message,2) X = Message(:,iBlock); The buffer states are stored as: AA = A; BB = B; CC = C; DD = D; The buffer is transformed by utilizing the X block from above, and the parameters from S, T and idxX k = 0; for iRound = 1:4 for q = 1:4 A = Fun(iRound,A,B,C,D,X(idxX(k+1)),S(k+1),T(k+1)); D = Fun(iRound,D,A,B,C,X(idxX(k+2)),S(k+2),T(k+2)); C = Fun(iRound,C,D,A,B,X(idxX(k+3)),S(k+3),T(k+3)); B = Fun(iRound,B,C,D,A,X(idxX(k+4)),S(k+4),T(k+4)); k = k + 4; end end The old buffer state is also being added: A = bitadd32(A,AA); B = bitadd32(B,BB); C = bitadd32(C,CC); D = bitadd32(D,DD); end The message digest is being formed the following way: Str = lower(dec2hex([A;B;C;D])); Str = Str(:,[7 8 5 6 3 4 1 2]).; Digest = Str(:).; The subsequent functionality is performed by the following operations: function y = Fun(iRound,a,b,c,d,x,s,t) switch iRound case 1 q = bitor(bitand(b,c),bitand(bitcmp(b),d)); case 2 q = bitor(bitand(b,d),bitand(c,bitcmp(d))); case 3 q = bitxor(bitxor(b,c),d); case 4 q = bitxor(c,bitor(b,bitcmp(d))); end y = bitadd32(b,rotateleft32(bitadd32(a,q,x,t),s)); And the bits are rotated such as: function y = rotateleft32(x,s) y = bitor(bitshift(x,s),bitshift(x,s-32)); The sum function is presented as: function sum = bitadd32(varargin) sum = varargin{1}; for k = 2:nargin add = varargin{k}; carry = bitand(sum,add); sum = bitxor(sum,add); for q = 1:32 shift = bitshift(carry,1); carry = bitand(shift,sum); sum = bitxor(shift,sum); end end A message is being read frm a file, such as: function [Message,nBits] = readmessagefromfile(FileName) [hFile,ErrMsg] = fopen(FileName,r); error(ErrMsg); Message = fread(hFile,inf,ubit32=>uint32); fclose(hFile); d = dir(FileName); nBits = d.bytes*8; Lastly, the auto test function is the following: function md5autotest disp(Running md5 autotest); Messages{1} = ; Messages{2} = a; Messages{3} = abc; Messages{4} = message digest; Messages{5} = abcdefghijklmnopqrstuvwxyz; Messages{6} = ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789; Messages{7} = char(128:255); CorrectDigests{1} = d41d8cd98f00b204e9800998ecf8427e; CorrectDigests{2} = 0cc175b9c0f1b6a831c399e269772661; CorrectDigests{3} = 900150983cd24fb0d6963f7d28e17f72; CorrectDigests{4} = f96b697d7cb7938d525a2f31aaf161d0; CorrectDigests{5} = c3fcd3d76192e4007dfb496cca67e13b; CorrectDigests{6} = d174ab98d277d9f5a5611c2c9f419d9f; CorrectDigests{7} = 16f404156c0500ac48efa2d3abc5fbcf; TmpFile = tempname; for k=1:numel(Messages) [h,ErrMsg] = fopen(TmpFile,w); error(ErrMsg); fwrite(h,Messages{k},char); fclose(h); Digest = md5(TmpFile); fprintf(%d: %sn,k,Digest); if ~strcmp(Digest,CorrectDigests{k}) error(md5 autotest failed on the following string: %s,Messages{k}); end end delete(TmpFile); disp(md5 autotest passed!); 4.4.1 Results This algorithm is tested with the input: university of Portsmouth department of electronic and computer engineering. This was written on the file: â€Å"C://md5InputFile.txt†. The outpus results are as in the following fugures: Textual description of the output results follows: OUTPUT FileName = C:\md5InputFile.txt Running md5 autotest FileName = C:\md5InputFile.txt 1986621045 1769173605 1864399220 1867522150 1836282994 1752462703 1885692960 1836348001 544501349 1696622191 1952671084 1768845170 1851859043 1868767332 1953853549 1696625253 1852401518 1769104741 26478 1: 3129b41fa9e7159c2a03ad8c161a7424 FileName = C:\md5InputFile.txt 1986621045 1769173605 1864399220 1867522150 1836282994 1752462703 1885692960 1836348001 544501349 1696622191 1952671084 1768845170 1851859043 1868767332 1953853549 1696625253 1852401518 1769104741 26478 2: 3129b41fa9e7159c2a03ad8c161a7424 FileName = C:\md5InputFile.txt 1986621045 1769173605 1864399220 1867522150 1836282994 1752462703 1885692960 1836348001 544501349 1696622191 1952671084 1768845170 1851859043 1868767332 1953853549 1696625253 1852401518 1769104741 26478 3: 3129b41fa9e7159c2a03ad8c161a7424 FileName = C:\md5InputFile.txt 1986621045 1769173605 1864399220 1867522150 1836282994 1752462703 1885692960 1836348001 544501349 1696622191 1952671084 1768845170 1851859043 1868767332 1953853549 1696625253 1852401518 1769104741 26478 4: 3129b41fa9e7159c2a03ad8c161a7424 FileName = C:\md5InputFile.txt 1986621045 1769173605 1864399220 1867522150 1836282994 1752462703 1885692960 1836348001 544501349 1696622191 1952671084 1768845170 1851859043 1868767332 1953853549 1696625253 1852401518 1769104741 26478 5: 3129b41fa9e7159c2a03ad8c161a7424 FileName = C:\md5InputFile.txt 1986621045 1769173605 1864399220 1867522150 1836282994 1752462703 1885692960 1836348001 544501349 1696622191 1952671084 1768845170 1851859043 1868767332 1953853549 1696625253 1852401518 1769104741 26478 6: 3129b41fa9e7159c2a03ad8c161a7424 FileName = C:\md5InputFile.txt 1986621045 1769173605 1864399220 1867522150 1836282994 1752462703 1885692960 1836348001 544501349 1696622191 1952671084 1768845170 1851859043 1868767332 1953853549 1696625253 1852401518 1769104741 26478 7: 3129b41fa9e7159c2a03ad8c161a7424 md5 autotest passed! 4.5. Introduction to Caesar cipher The Caesar cipher in cryptography, is in essence a shift cipher. It represents as one of the simplest and most widely known encryption methodologies. The Caesar cipher is a kind of substitution cipher. It means that each letter in a given plaintext is replaced by another letter. This is done due shifting by some fixed number of positions down the alphabet. Julius Caesar was the first to use this ci

Sunday, January 19, 2020

Jane Austen Essay

MAHA DOSTMOHAMED Maha Dostmohamed Ms. Jalaluddin ENG3U1 September 16th, 2011 Behind the Success of Jane Austen â€Å"In my stars I am above thee; but be not afraid of greatness: some are born great, some achieve greatness, and some have greatness thrust upon 'em. † (William Shakespeare). In this quote, William Shakespeare is talking about the different ways that one becomes great. To be born great, for example, is comparable to someone born into a royal family, one who did not have to do anything to become great. To achieve greatness, one must do something great, such as winning a Nobel Prize. For one to have greatness thrust upon oneself occurs when one does not pursue greatness; however, it is greatness that comes to find them. Some of the greatest people in the world did not take or receive credit or achieve fame for their greatness. Jane Austen is an example of this. Although Jane Austen’s books are widely known and loved, they initially failed to make her name world renown since they were originally published anonymously. Jane Austen’s most famous novel, Pride and Prejudice was the biggest contributing factor in Jane’s journey to success since the book has enjoyed endless amounts of adoration from fans and is what gave Jane Austen the recognition she receives today as an established author. Jane Austen was a literary phenomenon due to her interesting portrayals of families of various classes, her comical renditions of the mercenary of people in the 18th century, and her original and refreshing take on romance. MAHA DOSTMOHAMED It is arguable that a large percentage of Jane Austen’s success comes from her relatable, entertaining, and insightful portrayals of families of various classes. Firstly, Jane’s portrayals of families in Pride and Prejudice are relatable because they put emphasis on family aspects that occur in many different kinds of families and cultures. In her the book, Mrs. Bennet, the mother of the five Bennet sisters, is eager to have all of her daughters marry wealthy, suitable men. In modern day, this is comparable to an arranged marriage, a tradition that takes place in many families of different cultures and classes. Furthermore, Jane Austen’s portrayal of families also keeps her novels entertaining. The character of Mr. Bennet, for example, from Pride and Prejudice, adds comic relief to the novel because of the entertaining way he reacts to the actions of his wife and daughters. When the news of Mr. Bingley’s arrival to town comes, for instance, Mrs. Bennet is over-excited with the high hopes of marrying off one of her daughters, while Mr. Bennet finds that his wife is being silly, but agrees to meet with Mr. Bingley for the sake of his daughters anyway. Moreover, Jane Austen’s creations are insightful because she doesn’t take the usual, too-familiar path of writing, but instead takes readers for a walk down a brand new, unfamiliar, yet interesting road. This is seen through the character Elizabeth Bennet in Pride and Prejudice, and the way that this character fits into her family. Elizabeth is a charming, witty girl whose character in most stories would be the most loved in her family; but in Pride and Prejudice, Jane Austen shows the upsetting but realistic truth of how many a time in families, the more attractive child is loved over the child with the better personality. In Pride and Prejudice, Elizabeth’s sister Jane is loved by the family more than Elizabeth, and it is arguable that this strong adoration for Jane comes from the fact that Jane is the most beautiful of all the sisters. Finally, it is for MAHA DOSTMOHAMED all of these reasons that Jane Austen’s portrayals of families in Pride and Prejudice brought her success. Secondly, Jane Austen’s Pride and Prejudice brought her success because her comical renditions of the mercenary and ignorance of people in the 18th century were exhibited thoroughly in the book. One of the comical aspects of Pride and Prejudice is Jane Austen’s audacity with exhibiting the greed and mercenary of people in the 18th century, which was clearly seen through the characters of Mrs. Bennet and her neighbor, Lady Lucas. The way Mrs. Bennet and Lady Lucas are obsessed with the idea of having their daughters marry into wealthy families clearly shows the mercenary of people in the 18th century. Jane Austen exposed the morals of people in the 18th century as she displayed their ability to make important decisions such as finding a suitor for their daughters. She showed how they make marriage decisions based on how much money a possible suitor has to his name versus more personal and redeeming qualities. Furthermore, this money-based life in the 18th century is further exhibited through the character of Mr. Darcy, who along with his sister, is known to be very proud of his wealth. Furthermore, their pride revolving around their money made the book more popular because it was relatable since everyone knows of someone whose arrogance about their material items or money overpowers their more appealing qualities. In addition to that, the role money played in the lives of the characters also had an effect on their ignorance, another relatable subject. Mrs. Bennet is ignorant of the fact that instead of allowing her daughters to fall in love, she is only interested in finding husbands for her girls who have a lot of money, which can not only be related to the idea of an arranged MAHA DOSTMOHAMED marriage, but also how parents pressure their children when making career choices. Parents want their kids to pursue careers in which they will make a lot of money, rather than doing something with their life that they enjoy. This can be related to the way Mrs. Bennet wants her daughters to marry into wealthy families, although she believes she is doing what is in best interest of her girls, the girls may or may not see it the same way. Finally, Jane Austen’s renditions of 18th century people made Pride and Prejudice successful. Thirdly, Pride and Prejudice brought success to Jane Austen because of the original, refreshing perspective she had on romance, which was shown through the relationship between the novel’s two main characters, Elizabeth and Mr. Darcy. Firstly, the originality of this romance can be seen from the start of their relationship, from their first impressions. The first impressions these two characters develop of each other are so important to the themes of this novel that Jane Austen’s original title for the book was â€Å"First Impressions†. What is original about their first impressions is the fact that the romantic story that Jane Austen is telling is not the usual, too-familiar story of â€Å"love at first sight†, but rather the story of how two people who at first loathed each other, could fall in love. This brought popularity to the novel and to Jane Austen because readers loved the way that Elizabeth and Darcy went from hating to loving each other. In addition to that, the fact that a man like Mr. Darcy, a wealthy man with a vast amount of pride had the ability to fall in love with a girl like Elizabeth, rather than a girl more like her sister, Jane Bennet made readers fall in love with the story. In the novel, Elizabeth, although witty and lovable, is not the most beautiful of girls. In fact, when Mr. Darcy initially sees MAHA DOSTMOHAMED Elizabeth, he says that her appearance is nothing but â€Å"tolerable†, making it obvious that he sees her beauty miniscule when compared to that of her sister, Jane. The fact that Mr. Darcy acknowledges that Elizabeth is not the most beautiful of her sisters, knowing that if he had her he would not have the â€Å"best†, yet falls in love with her, is what readers fell in love with. Finally, Jane Austen’s novel Pride and Prejudice was a big factor regarding Jane Austen’s success because it highlighted Jane’s unique, original, and refreshing take on romance, which is a big part of what made readers love her. In conclusion, Jane Austen was a phenomenon and her success in writing is owed to her novel Pride and Prejudice which made readers fall in love with her interesting portrayals of families of various classes, her comical renditions of the mercenary and ignorance of people in the 18th century, and her original and refreshing take on romance. Jane Austen’s writings were comic, relatable, realistic, tasteful, refreshing, and original, all things that contributed to the rise in her success. Last of all, Jane Austen was a worldrenowned author whose creations have always been, and always will be, treasured and loved by many and most parts of the world for their excellence.

Saturday, January 11, 2020

The Lost Symbol Chapter 79-82

CHAPTER 79 Eight miles due north of Alexandria, Virginia, Robert Langdon and Katherine Solomon strode calmly across a wide expanse of frost-covered lawn. â€Å"You should be an actress,† Langdon said, still impressed by Katherine's quick thinking and improvisational skills. â€Å"You weren't half bad yourself.† She gave him a smile. At first, Langdon had been mystified by Katherine's abrupt antics in the taxi. Without warning, she had suddenly demanded they go to Freedom Plaza based on some revelation about a Jewish star and the Great Seal of the United States. She drew a well-known conspiracy-theory image on a dollar bill and then insisted Langdon look closely where she was pointing. Finally, Langdon realized that Katherine was pointing not at the dollar bill but at a tiny indicator bulb on the back of the driver's seat. The bulb was so covered with grime that he had not even noticed it. As he leaned forward, however, he could see that the bulb was illuminated, emitting a dull red glow. He could also see the two faint words directly beneath the lit bulb. –INTERCOM ON– Startled, Langdon glanced back at Katherine, whose frantic eyes were urging him to look into the front seat. He obeyed, stealing a discreet glance through the divider. The cabby's cell phone was on the dash, wide open, illuminated, facing the intercom speaker. An instant later, Langdon understood Katherine's actions. They know we're in this cab . . . they've been listening to us. Langdon had no idea how much time he and Katherine had until their taxi was stopped and surrounded, but he knew they had to act fast. Instantly, he'd begun playing along, realizing that Katherine's desire to go to Freedom Plaza had nothing to do with the pyramid but rather with its being a large subway station–Metro Center–from which they could take the Red, Blue, or Orange lines in any of six different directions. They jumped out of the taxi at Freedom Plaza, and Langdon took over, doing some improvising of his own, leaving a trail to the Masonic Memorial in Alexandria before he and Katherine ran down into the subway station, dashing past the Blue Line platforms and continuing on to the Red Line, where they caught a train in the opposite direction. Traveling six stops northbound to Tenleytown, they emerged all alone into a quiet, upscale neighborhood. Their destination, the tallest structure for miles, was immediately visible on the horizon, just off Massachusetts Avenue on a vast expanse of manicured lawn. Now â€Å"off the grid,† as Katherine called it, the two of them walked across the damp grass. On their right was a medieval-style garden, famous for its ancient rosebushes and Shadow House gazebo. They moved past the garden, directly toward the magnificent building to which they had been summoned. A refuge containing ten stones from Mount Sinai, one from heaven itself, and one with the visage of Luke's dark father. â€Å"I've never been here at night,† Katherine said, gazing up at the brightly lit towers. â€Å"It's spectacular.† Langdon agreed, having forgotten how impressive this place truly was. This neo-Gothic masterpiece stood at the north end of Embassy Row. He hadn't been here for years, not since writing a piece about it for a kids' magazine in hopes of generating some excitement among young Americans to come see this amazing landmark. His article–â€Å"Moses, Moon Rocks, and Star Wars†Ã¢â‚¬â€œhad been part of the tourist literature for years. Washington National Cathedral, Langdon thought, feeling an unexpected anticipation at being back after all these years. Where better to ask about One True God? â€Å"This cathedral really has ten stones from Mount Sinai?† Katherine asked, gazing up at the twin bell towers. Langdon nodded. â€Å"Near the main altar. They symbolize the Ten Commandments given to Moses on Mount Sinai.† â€Å"And there's a lunar rock?† A rock from heaven itself. â€Å"Yes. One of the stained-glass windows is called the Space Window and has a fragment of moon rock embedded in it.† â€Å"Okay, but you can't be serious about the last thing.† Katherine glanced over, her pretty eyes flashing skepticism. â€Å"A statue of . . . Darth Vader?† Langdon chuckled. â€Å"Luke Skywalker's dark father? Absolutely. Vader is one of the National Cathedral's most popular grotesques.† He pointed high into the west towers. â€Å"Tough to see him at night, but he's there.† â€Å"What in the world is Darth Vader doing on Washington National Cathedral?† â€Å"A contest for kids to carve a gargoyle that depicted the face of evil. Darth won.† They reached the grand staircase to the main entrance, which was set back in an eighty-foot archway beneath a breathtaking rose window. As they began climbing, Langdon's mind shifted to the mysterious stranger who had called him. No names, please . . . Tell me, have you successfully protected the map that was entrusted to you? Langdon's shoulder ached from carrying the heavy stone pyramid, and he was looking forward to setting it down. Sanctuary and answers. As they approached the top of the stairs, they were met with an imposing pair of wooden doors. â€Å"Do we just knock?† Katherine asked. Langdon had been wondering the same thing, except that now one of the doors was creaking open. â€Å"Who's there?† a frail voice said. The face of a withered old man appeared in the doorway. He wore priest's robes and a blank stare. His eyes were opaque and white, clouded with cataracts. â€Å"My name is Robert Langdon,† he replied. â€Å"Katherine Solomon and I are seeking sanctuary.† The blind man exhaled in relief. â€Å"Thank God. I've been expecting you.† CHAPTER 80 Warren Bellamy felt a sudden ray of hope. Inside the Jungle, Director Sato had just received a phone call from a field agent and had immediately flown into a tirade. â€Å"Well, you damn well better find them!† she shouted into her phone. â€Å"We're running out of time!† She had hung up and was now stalking back and forth in front of Bellamy as if trying to decide what to do next. Finally, she stopped directly in front of him and turned. â€Å"Mr. Bellamy, I'm going to ask you this once, and only once.† She stared deep into his eyes. â€Å"Yes or no–do you have any idea where Robert Langdon might have gone?† Bellamy had more than a good idea, but he shook his head. â€Å"No.† Sato's piercing gaze had never left his eyes. â€Å"Unfortunately, part of my job is to know when people are lying.† Bellamy averted his eyes. â€Å"Sorry, I can't help you.† â€Å"Architect Bellamy,† Sato said, â€Å"tonight just after seven P.M., you were having dinner in a restaurant outside the city when you received a phone call from a man who told you he had kidnapped Peter Solomon.† Bellamy felt an instant chill and returned his eyes to hers. How could you possibly know that?! â€Å"The man,† Sato continued, â€Å"told you that he had sent Robert Langdon to the Capitol Building and given Langdon a task to complete . . . a task that required your help. He warned that if Langdon failed in this task, your friend Peter Solomon would die. Panicked, you called all of Peter's numbers but failed to reach him. Understandably, you then raced to the Capitol.† Bellamy could not imagine how Sato knew about this phone call. â€Å"As you fled the Capitol,† Sato said behind the smoldering tip of her cigarette, â€Å"you sent a text message to Solomon's kidnapper, assuring him that you and Langdon had been successful in obtaining the Masonic Pyramid.† Where is she getting her information? Bellamy wondered. Not even Langdon knows I sent that text message. Immediately after entering the tunnel to the Library of Congress, Bellamy had stepped into the electrical room to plug in the construction lighting. In the privacy of that moment, he had decided to send a quick text message to Solomon's captor, telling him about Sato's involvement, but reassuring him that he– Bellamy–and Langdon had obtained the Masonic Pyramid and would indeed cooperate with his demands. It was a lie, of course, but Bellamy hoped the reassurance might buy time, both for Peter Solomon and also to hide the pyramid. â€Å"Who told you I sent a text?† Bellamy demanded. Sato tossed Bellamy's cell phone on the bench next to him. â€Å"Hardly rocket science.† Bellamy now remembered his phone and keys had been taken from him by the agents who captured him. â€Å"As for the rest of my inside information,† Sato said, â€Å"the Patriot Act gives me the right to place a wiretap on the phone of anyone I consider a viable threat to national security. I consider Peter Solomon to be such a threat, and last night I took action.† Bellamy could barely get his mind around what she was telling him. â€Å"You're tapping Peter Solomon's phone?† â€Å"Yes. This is how I knew the kidnapper called you at the restaurant. You called Peter's cell phone and left an anxious message explaining what had just happened.† Bellamy realized she was right. â€Å"We had also intercepted a call from Robert Langdon, who was in the Capitol Building, deeply confused to learn he had been tricked into coming there. I went to the Capitol at once, arriving before you because I was closer. As for how I knew to check the X-ray of Langdon's bag . . . in light of my realization that Langdon was involved in all of this, I had my staff reexamine a seemingly innocuous early-morning call between Langdon and Peter Solomon's cell phone, in which the kidnapper, posing as Solomon's assistant, persuaded Langdon to come for a lecture and also to bring a small package that Peter had entrusted to him. When Langdon was not forthcoming with me about the package he was carrying, I requested the X-ray of his bag.† Bellamy could barely think. Admittedly, everything Sato was saying was feasible, and yet something was not adding up. â€Å"But . . . how could you possibly think Peter Solomon is a threat to national security?† â€Å"Believe me, Peter Solomon is a serious national-security threat,† she snapped. â€Å"And frankly, Mr. Bellamy, so are you.† Bellamy sat bolt upright, the handcuffs chafing against his wrists. â€Å"I beg your pardon?!† She forced a smile. â€Å"You Masons play a risky game. You keep a very, very dangerous secret.† Is she talking about the Ancient Mysteries? â€Å"Thankfully, you've always done a good job of keeping your secrets hidden. Unfortunately, recently you've been careless, and tonight, your most dangerous secret is about to be unveiled to the world. And unless we can stop that from happening, I assure you the results will be catastrophic.† Bellamy stared in bewilderment. â€Å"If you had not attacked me,† Sato said, â€Å"you would have realized that you and I are on the same team.† The same team. The words sparked in Bellamy an idea that seemed almost impossible to fathom. Is Sato a member of Eastern Star? The Order of the Eastern Star–often considered a sister organization to the Masons–embraced a similar mystical philosophy of benevolence, secret wisdom, and spiritual open-mindedness. The same team? I'm in handcuffs! She's tapping Peter's phone! â€Å"You will help me stop this man,† Sato said. â€Å"He has the potential to bring about a cataclysm from which this country might not recover.† Her face was like stone. â€Å"Then why aren't you tracking him?† Sato looked incredulous. â€Å"Do you think I'm not trying? My trace on Solomon's cell phone went dead before we got a location. His other number appears to be a disposable phone–which is almost impossible to track. The private-jet company told us that Langdon's flight was booked by Solomon's assistant, on Solomon's cell phone, with Solomon's Marquis Jet card. There is no trail. Not that it matters anyway. Even if we find out exactly where he is, I can't possibly risk moving in and trying to grab him.† â€Å"Why not?!† â€Å"I'd prefer not to share that, as the information is classified,† Sato said, patience clearly waning. â€Å"I am asking you to trust me on this.† â€Å"Well, I don't!† Sato's eyes were like ice. She turned suddenly and shouted across the Jungle. â€Å"Agent Hartmann! The briefcase, please.† Bellamy heard the hiss of the electronic door, and an agent strode into the Jungle. He was carrying a sleek titanium briefcase, which he set on the ground beside the OS director. â€Å"Leave us,† Sato said. As the agent departed, the door hissed again, and then everything fell silent. Sato picked up the metal case, laid it across her lap, and popped the clasps. Then she raised her eyes slowly to Bellamy. â€Å"I did not want to do this, but our time is running out, and you've left me no choice.† Bellamy eyed the strange briefcase and felt a swell of fear. Is she going to torture me? He strained at his cuffs again. â€Å"What's in that case?!† Sato smiled grimly. â€Å"Something that will persuade you to see things my way. I guarantee it.† CHAPTER 81 The subterranean space in which Mal'akh performed the Art was ingeniously hidden. His home's basement, to those who entered, appeared quite normal–a typical cellar with boiler, fuse box, woodpile, and a hodgepodge of storage. This visible cellar, however, was only a portion of Mal'akh's underground space. A sizable area had been walled off for his clandestine practices. Mal'akh's private work space was a suite of small rooms, each with a specialized purpose. The area's sole entrance was a steep ramp secretly accessible through his living room, making the area's discovery virtually impossible. Tonight, as Mal'akh descended the ramp, the tattooed sigils and signs on his flesh seemed to come alive in the cerulean glow of his basement's specialized lighting. Moving into the bluish haze, he walked past several closed doors and headed directly for the largest room at the end of the corridor. The â€Å"sanctum sanctorum,† as Mal'akh liked to call it, was a perfect twelve-foot square. Twelve are the signs of the zodiac. Twelve are the hours of the day. Twelve are the gates of heaven. In the center of the chamber was a stone table, a seven-by-seven square. Seven are the seals of Revelation. Seven are the steps of the Temple. Centered over the table hung a carefully calibrated light source that cycled through a spectrum of preordained colors, completing its cycle every six hours in accordance with the sacred Table of Planetary Hours. The hour of Yanor is blue. The hour of Nasnia is red. The hour of Salam is white. Now was the hour of Caerra, meaning the light in the room had modulated to a soft purplish hue. Wearing only a silken loincloth wrapped around his buttocks and neutered sex organ, Mal'akh began his preparations. He carefully combined the suffumigation chemicals that he would later ignite to sanctify the air. Then he folded the virgin silk robe that he would eventually don in place of his loincloth. And finally, he purified a flask of water for the anointing of his offering. When he was done, he placed all of these prepared ingredients on a side table. Next he went to a shelf and retrieved a small ivory box, which he carried to the side table and placed with the other items. Although he was not yet ready to use it, he could not resist opening the lid and admiring this treasure. The knife. Inside the ivory box, nestled in a cradle of black velvet, shone the sacrificial knife that Mal'akh had been saving for tonight. He had purchased it for $1.6 million on the Middle Eastern antiquities black market last year. The most famous knife in history. Unimaginably old and believed lost, this precious blade was made of iron, attached to a bone handle. Over the ages, it had been in the possession of countless powerful individuals. In recent decades, however, it had disappeared, languishing in a secret private collection. Mal'akh had gone to enormous lengths to obtain it. The knife, he suspected, had not drawn blood for decades . . . possibly centuries. Tonight, this blade would again taste the power of the sacrifice for which it was honed. Mal'akh gently lifted the knife from its cushioned compartment and reverently polished the blade with a silk cloth soaked in purified water. His skills had progressed greatly since his first rudimentary experiments in New York. The dark Art that Mal'akh practiced had been known by many names in many languages, but by any name, it was a precise science. This primeval technology had once held the key to the portals of power, but it had been banished long ago, relegated to the shadows of occultism and magic. Those few who still practiced this Art were considered madmen, but Mal'akh knew better. This is not work for those with dull faculties. The ancient dark Art, like modern science, was a discipline involving precise formulas, specific ingredients, and meticulous timing. This Art was not the impotent black magic of today, often practiced halfheartedly by curious souls. This Art, like nuclear physics, had the potential to unleash enormous power. The warnings were dire: The unskilled practitioner runs the risk of being struck by a reflux current and destroyed. Mal'akh finished admiring the sacred blade and turned his attention to a lone sheet of thick vellum lying on the table before him. He had made this vellum himself from the skin of a baby lamb. As was the protocol, the lamb was pure, having not yet reached sexual maturity. Beside the vellum was a quill pen he had made from the feather of a crow, a silver saucer, and three glimmering candles arranged around a solid-brass bowl. The bowl contained one inch of thick crimson liquid. The liquid was Peter Solomon's blood. Blood is the tincture of eternity. Mal'akh picked up the quill pen, placed his left hand on the vellum, and dipping the quill tip in the blood, he carefully traced the outline of his open palm. When he was done, he added the five symbols of the Ancient Mysteries, one on each fingertip of the drawing. The crown . . . to represent the king I shall become. The star . . . to represent the heavens which have ordained my destiny. The sun . . . to represent the illumination of my soul. The lantern . . . to represent the feeble light of human understanding. And the key . . . to represent the missing piece, that which tonight I shall at last possess. Mal'akh completed his blood tracing and held up the vellum, admiring his work in the light of the three candles. He waited until the blood was dry and then folded the thick vellum three times. While chanting an ethereal ancient incantation, Mal'akh touched the vellum to the third candle, and it burst into flames. He set the flaming vellum on the silver saucer and let it burn. As it did, the carbon in the animal skin dissolved to a powdery black char. When the flame went out, Mal'akh carefully tapped the ashes into the brass bowl of blood. Then he stirred the mixture with the crow's feather. The liquid turned a deeper crimson, nearly black. Holding the bowl in both palms, Mal'akh raised it over his head and gave thanks, intoning the blood eukharistos of the ancients. Then he carefully poured the blackened mixture into a glass vial and corked it. This would be the ink with which Mal'akh would inscribe the untattooed flesh atop his head and complete his masterpiece. CHAPTER 82 Washington National Cathedral is the sixth-largest cathedral in the world and soars higher than a thirty-story skyscraper. Embellished with over two hundred stained-glass windows, a fifty- three-bell carillon, and a 10,647-pipe organ, this Gothic masterpiece can accommodate more than three thousand worshippers. Tonight, however, the great cathedral was deserted. Reverend Colin Galloway–dean of the cathedral–looked like he had been alive forever. Stooped and withered, he wore a simple black cassock and shuffled blindly ahead without a word. Langdon and Katherine followed in silence through the darkness of the four-hundred-foot- long nave's central aisle, which was curved ever so slightly to the left to create a softening optical illusion. When they reached the Great Crossing, the dean guided them through the rood screen–the symbolic divider between the public area and the sanctuary beyond. The scent of frankincense hung in the air of the chancel. This sacred space was dark, illuminated only by indirect reflections in the foliated vaults overhead. Flags of the fifty states hung above the quire, which was ornately appointed with several carved reredos depicting biblical events. Dean Galloway continued on, apparently knowing this walk by heart. For a moment, Langdon thought they were headed straight for the high altar, where the ten stones from Mount Sinai were embedded, but the old dean finally turned left and groped his way through a discreetly hidden door that led into an administrative annex. They moved down a short hallway to an office door bearing a brass nameplate: THE REVEREND DR. COLIN GALLOWAY CATHEDRAL DEAN Galloway opened the door and turned on the lights, apparently accustomed to remembering this courtesy for his guests. He ushered them in and closed the door. The dean's office was small but elegant, with high bookshelves, a desk, a carved armoire, and a private bathroom. On the walls hung sixteenth-century tapestries and several religious paintings. The old dean motioned to the two leather chairs directly opposite his desk. Langdon sat with Katherine and felt grateful finally to set his heavy shoulder bag on the floor at his feet. Sanctuary and answers, Langdon thought, settling into the comfortable chair. The aged man shuffled around behind his desk and eased himself down into his high-backed chair. Then, with a weary sigh, he raised his head, staring blankly out at them through clouded eyes. When he spoke, his voice was unexpectedly clear and strong. â€Å"I realize we have never met,† the old man said, â€Å"and yet I feel I know you both.† He took out a handkerchief and dabbed his mouth. â€Å"Professor Langdon, I am familiar with your writings, including the clever piece you did on the symbolism of this cathedral. And, Ms. Solomon, your brother, Peter, and I have been Masonic brothers for many years now.† â€Å"Peter is in terrible trouble,† Katherine said. â€Å"So I have been told.† The old man sighed. â€Å"And I will do everything in my power to help you.† Langdon saw no Masonic ring on the dean's finger, and yet he knew many Masons, especially those within the clergy, chose not to advertise their affiliation. As they began to talk, it became clear that Dean Galloway already knew some of the night's events from Warren Bellamy's phone message. As Langdon and Katherine filled him in on the rest, the dean looked more and more troubled. â€Å"And this man who has taken our beloved Peter,† the dean said, â€Å"he is insisting you decipher the pyramid in exchange for Peter's life?† â€Å"Yes,† Langdon said. â€Å"He thinks it's a map that will lead him to the hiding place of the Ancient Mysteries.† The dean turned his eerie, opaque eyes toward Langdon. â€Å"My ears tell me you do not believe in such things.† Langdon did not want to waste time going down this road. â€Å"It doesn't matter what I believe. We need to help Peter. Unfortunately, when we deciphered the pyramid, it pointed nowhere.† The old man sat straighter. â€Å"You've deciphered the pyramid?† Katherine interceded now, quickly explaining that despite Bellamy's warnings and her brother's request that Langdon not unwrap the package, she had done so, feeling her first priority was to help her brother however she could. She told the dean about the golden capstone, Albrecht Durer's magic square, and how it decrypted the sixteen-letter Masonic cipher into the phrase Jeova Sanctus Unus. â€Å"That's all it says?† the dean asked. â€Å"One True God?† â€Å"Yes, sir,† Langdon replied. â€Å"Apparently the pyramid is more of a metaphorical map than a geographic one.† The dean held out his hands. â€Å"Let me feel it.† Langdon unzipped his bag and pulled out the pyramid, which he carefully hoisted up on the desk, setting it directly in front of the reverend. Langdon and Katherine watched as the old man's frail hands examined every inch of the stone– the engraved side, the smooth base, and the truncated top. When he was finished, he held out his hands again. â€Å"And the capstone?† Langdon retrieved the small stone box, set it on the desk, and opened the lid. Then he removed the capstone and placed it into the old man's waiting hands. The dean performed a similar examination, feeling every inch, pausing on the capstone's engraving, apparently having some trouble reading the small, elegantly inscribed text. â€Å"`The secret hides within The Order,'† Langdon offered. â€Å"And the words the and order are capitalized.† The old man's face was expressionless as he positioned the capstone on top of the pyramid and aligned it by sense of touch. He seemed to pause a moment, as if in prayer, and reverently ran his palms over the complete pyramid several times. Then he reached out and located the cube- shaped box, taking it in his hands, feeling it carefully, his fingers probing inside and out. When he was done, he set down the box and leaned back in his chair. â€Å"So tell me,† he demanded, his voice suddenly stern. â€Å"Why have you come to me?† The question took Langdon off guard. â€Å"We came, sir, because you told us to. And Mr. Bellamy said we should trust you.† â€Å"And yet you did not trust him?† â€Å"I'm sorry?† The dean's white eyes stared directly through Langdon. â€Å"The package containing the capstone was sealed. Mr. Bellamy told you not to open it, and yet you did. In addition, Peter Solomon himself told you not to open it. And yet you did.† â€Å"Sir,† Katherine intervened, â€Å"we were trying to help my brother. The man who has him demanded we decipher–â€Å" â€Å"I can appreciate that,† the dean declared, â€Å"and yet what have you achieved by opening the package? Nothing. Peter's captor is looking for a location, and he will not be satisfied with the answer of Jeova Sanctus Unus.† â€Å"I agree,† Langdon said, â€Å"but unfortunately that's all the pyramid says. As I mentioned, the map seems to be more figurative than–â€Å" â€Å"You're mistaken, Professor,† the dean said. â€Å"The Masonic Pyramid is a real map. It points to a real location. You do not understand that, because you have not yet deciphered the pyramid fully. Not even close.† Langdon and Katherine exchanged startled looks. The dean laid his hands back on the pyramid, almost caressing it. â€Å"This map, like the Ancient Mysteries themselves, has many layers of meaning. Its true secret remains veiled from you.† â€Å"Dean Galloway,† Langdon said, â€Å"we've been over every inch of the pyramid and capstone, and there's nothing else to see.† â€Å"Not in its current state, no. But objects change.† â€Å"Sir?† â€Å"Professor, as you know, the promise of this pyramid is one of miraculous transformative power. Legend holds that this pyramid can change its shape . . . alter its physical form to reveal its secrets. Like the famed stone that released Excalibur into the hands of King Arthur, the Masonic Pyramid can transform itself if it so chooses . . . and reveal its secret to the worthy.† Langdon now sensed that the old man's advanced years had perhaps robbed him of his faculties. â€Å"I'm sorry, sir. Are you saying this pyramid can undergo a literal physical transformation?† â€Å"Professor, if I were to reach out with my hand and transform this pyramid right before your eyes, would you believe what you had witnessed?† Langdon had no idea how to respond. â€Å"I suppose I would have no choice.† â€Å"Very well, then. In a moment, I shall do exactly that.† He dabbed his mouth again. â€Å"Let me remind you that there was an era when even the brightest minds perceived the earth as flat. For if the earth were round, then surely the oceans would spill off. Imagine how they would have mocked you if you proclaimed, `Not only is the world a sphere, but there is an invisible, mystical force that holds everything to its surface'!† â€Å"There's a difference,† Langdon said, â€Å"between the existence of gravity . . . and the ability to transform objects with a touch of your hand.† â€Å"Is there? Is it not possible that we are still living in the Dark Ages, still mocking the suggestion of `mystical' forces that we cannot see or comprehend. History, if it has taught us anything at all, has taught us that the strange ideas we deride today will one day be our celebrated truths. I claim I can transform this pyramid with a touch of my finger, and you question my sanity. I would expect more from an historian. History is replete with great minds who have all proclaimed the same thing . . . great minds who have all insisted that man possesses mystical abilities of which he is unaware.† Langdon knew the dean was correct. The famous Hermetic aphorism–Know ye not that ye are gods?–was one of the pillars of the Ancient Mysteries. As above, so below . . . Man created in God's image . . . Apotheosis. This persistent message of man's own divinity–of his hidden potential–was the recurring theme in the ancient texts of countless traditions. Even the Holy Bible cried out in Psalms 82:6: Ye are gods! â€Å"Professor,† the old man said, â€Å"I realize that you, like many educated people, live trapped between worlds–one foot in the spiritual, one foot in the physical. Your heart yearns to believe . . . but your intellect refuses to permit it. As an academic, you would be wise to learn from the great minds of history.† He paused and cleared his throat. â€Å"If I'm remembering correctly, one of the greatest minds ever to live proclaimed: `That which is impenetrable to us really exists. Behind the secrets of nature remains something subtle, intangible, and inexplicable. Veneration for this force beyond anything that we can comprehend is my religion.' â€Å" â€Å"Who said that?† Langdon said. â€Å"Gandhi?† â€Å"No,† Katherine interjected. â€Å"Albert Einstein.† Katherine Solomon had read every word Einstein had ever written and was struck by his profound respect for the mystical, as well as his predictions that the masses would one day feel the same. The religion of the future, Einstein had predicted, will be a cosmic religion. It will transcend personal God and avoid dogma and theology. Robert Langdon appeared to be struggling with the idea. Katherine could sense his rising frustration with the old Episcopal priest, and she understood. After all, they had traveled here for answers, and they had found instead a blind man who claimed he could transform objects with a touch of his hands. Even so, the old man's overt passion for mystical forces reminded Katherine of her brother. â€Å"Father Galloway,† Katherine said, â€Å"Peter is in trouble. The CIA is chasing us. And Warren Bellamy sent us to you for help. I don't know what this pyramid says or where it points, but if deciphering it means that we can help Peter, we need to do that. Mr. Bellamy may have preferred to sacrifice my brother's life to hide this pyramid, but my family has experienced nothing but pain because of it. Whatever secret it may hold, it ends tonight.† â€Å"You are correct,† the old man replied, his tone dire. â€Å"It will all end tonight. You've guaranteed that.† He sighed. â€Å"Ms. Solomon, when you broke the seal on that box, you set in motion a series of events from which there will be no return. There are forces at work tonight that you do not yet comprehend. There is no turning back.† Katherine stared dumbfounded at the reverend. There was something apocalyptic about his tone, as if he were referring to the Seven Seals of Revelation or Pandora's box. â€Å"Respectfully, sir,† Langdon interceded, â€Å"I can't imagine how a stone pyramid could set in motion anything at all.† â€Å"Of course you can't, Professor.† The old man stared blindly through him. â€Å"You do not yet have eyes to see.†

Friday, January 3, 2020

Why Snowden Is A Hero Or A Traitor - 1691 Words

Edward Snowden’s disclosures about the National Intelligence Agency surveillance extension is some of the most comprehensive news in recent history. It has incited a ferocious debate over national security and information privacy. As the U.S government deliberates various reform proposals, arguments continue on whether Snowden is a hero or a traitor (Simcox, 2015). No place to hide, is a 2014 non-fiction book by the former constitutional lawyer and author Glenn Greenwald. He argues in favour of U.S government accountability for the National Security Agency illegal domestic spying program that allegedly aims to defend against potential terrorism. The unreasonable level of surveillance breaches citizens and foreigners’ privacy. Greenwald†¦show more content†¦Greenwald uses experience, credentials, and conclusions of an expert to vouch for his argument, which, in turn strengthens it. His usage of short quotes enables a critical voice while using evidence to support his analysis. Thirdly, Greenwald combines quantitative and qualitative data through visuals withdrawn from the leaked archives of documents. To illustrate, he provides a chart from the NSA breakdown that quantifies the number of calls and emails collected for each country. â€Å"For Poland, the chart shows more than three million telephone calls on some days, for a thirty-day total of seventy-one million† (p.99). He uses the charts from the leaked documents as evidence to support his argument on the NSA’s unreasonable levels of surveillance on foreign countries. The integration of visuals into the book is vital for readability. A reader with no previous background in statistics can easily understand the explanations to reveal important patterns. Therefore, it strengthens his argument. Additionally, Greenwald’s usage of qualitative data provides an insight into the problem of surveillance. For example, Greenwald uses descriptive statements about intelligence and surveillance based on observations, interviews or evaluations. For instance, Greenwald states, â€Å"those state authorities have been assisted in their assault on privacy by aShow MoreRelatedWhy Snowden Is A Traitor And Not A Hero1256 Words   |  6 PagesEdward Joseph Snowden, former CIA employee, is a cyber-security specialist and an American hacktivist. In 2013, he leaked classified information from the U.S. National Security Agency (NSA), which revealed numerous global surveillance programs. His actions labeled him as a criminal by American government and as a hero or whistleblower by privacy activists. Snowden soon became a subject of controversy because the information he leaked fueled many debates in regards to government surveillance and theRead MoreEssay Edward Snowden: Traitor or Whistle blower880 Words   |  4 PagesEdward Snowden. This is a name that will be in the history books for ages. He will be branded a traitor or a whistleblower depending on where you look. Many Americans feel that Edward Snowden is a traitor who sold the United States’ secrets aiming to harm the nation. Others believe that he was simply a citizen of the United States who exercised his right to expose the government for their unconstitutional actions. It is important to not only know the two sides to the argument of friend or foeRead MoreEthics of Edward Snowden Essay1006 Words   |  5 Pageswrong. For example Edward Snowden, a 30 year old man was born in North Carolina in 1983 (Edward snowden.biography, 2013, para. 1). Edward Snowden was a security guard that worked for the National Security Agency (NSA), after three months Edward Snowden started to collect NSA files and fled to Hong Kong and leaked the files. China started to print out report of the files that Edward Sno wden has leaked to China about the NSA spying on U.S citizens. The reason that Edward Snowden left the United StatesRead MoreEdward Snowden: Hero or Traitor?1053 Words   |  5 Pagesconfrontations over the years about the extent of the N.S.A.’s spying; however, the most recent whistle-blower, Edward Snowden, leaked information that caused much upset throughout America (EFF). It has also brought many people to question: is he a hero or a traitor? One Snowden supporter is John Cassidy, who states that the public has the right to know the information Snowden brought forth. This information includes domestic spying. Without him, innocent people would continue to be spied on byRead MoreThe Security Agency Nsa ( Nsa )1347 Words   |  6 Pagescasting channels broke the story that the National Security Agency (NSA) was â€Å"spying† on United States citizens, and that communication in the U.S. was not private. Edward Snowden, formerly worked as a technical contractor for the NSA at the time, gave the media the information for the story. At the time of the release of the story, Snowden was in Hong Kong. This trip was a deliberately planned in order to keep himself from being immediately incarcerated in the United States. The NSA’s surveillance effortsRead MoreThis Report Purpose Is To Provide A Point Of View About1352 Words   |  6 Pagescharges against Edward Snowden, a former CIA (Central Intelligence Agency) emp loyee, a former contractor for the United States government, he copied and leaked classified information from the NSA organization without permissions in 2013. Snowden was charged with three different felonies on June 2013, as he stole a governmental property unauthorized communication of national defense information. The following number of lines could provide a detailed explanation for why Snowden was charged with theseRead MoreEssay On Internet Privacy1471 Words   |  6 Pagesmost companies that how well they maintain security and provides privacy to their customers’ information. The companies are afraid of media to find out someone getting affected by his information being leaked due to weak security policies. That is why big companies like Verizon and ATT own their own channels. I would like to put forward one of the prevalent privacy policies over the internet ‘Right to be Forgotten’ on search engines. This policy allows an individual or organizations to deleteRead MoreHolding Out For A Hero867 Words   |  4 PagesHolding Out For a Hero The article, â€Å"Why Edward Snowden is a Hero,† penned by John Cassidy, seeks to illuminate the actions of Edward Snowden. As an international controversial figure, Snowden is responsible for leaking enormous amounts of classified information regarding the National Security Agency (N.S.A.). Cassidy contends the data Snowden disclosed to the public revealed that the government actively, knowingly, and deliberately trampled upon the liberties of the American peopleRead MoreAnalysis Of The Documentary Citizenfour An Hbo Documentary, Directed By Laura Poitras1109 Words   |  5 Pageson Americans for years. It was’t until 2013 when ex-NSA worker, Edward Snowden, released secret information entailing the real activities of the NSA, involving access to virtually any American’s private life. In Citizenfour, an HBO documentary, directed by Laura Poitras, Edward Snowden contacts Laura under code name, Citizenfour, to share his knowledge on the truth behin d government spying. Laura ended up meeting up with Snowden and documented his interviews and his life after he revealed himself asRead MoreContemporary Outlaws : Today s Modern Outlaws1529 Words   |  7 PagesWild West because it’s a new frontier that keeps growing without control, and laws are still being set in place so everyone online is free to do as they wish until a law has been set in place. The modern outlaws I will be writing about are Edward Snowden, Julian Assange and the hacker group of Anonymous. Each out law has provide some type of service or information to the public that was secret and important to the world community, but was being withheld from the public eye because of powerful people