PRO Designer Babies

Style: Persuasive

Sources: Your sources must be obtained from approved databases, educational journals or books, not websites. The minimum number is ten
valid sources.

When researching their chosen social ethical topic, you will be required to research the topics of theology and history plus two [2] of

the following disciplines – visual and auditory
communication [e.g. art, music or fine arts]; science and math; language, literature, culture; social sciences – displayed on the

schematics that follow that best fit your chosen topic.

***MUST INCLUDE EACH OF THE FOLLOWING BOLDED

History Work page
Start with looking up the history of your topic. What has impacted the topic both positively and negatively and date these facts. Use

chart one to help you outline the things that pertain to your topic. Highlight any information that you see occurring in other areas of

your
research. These are the areas that will help you tie all your research together during the synthesis stage. You will continually be

adding information to this pros and cons timeline as you read new articles pertaining to your subject. Look for chronology of events,

policies
and legislation, demonstrations and political movements, groups and leaders and also discoveries that have impacted the issue over

time.

Theology Work page
Read about your topic and find sources that both support and negate your position. Enter them
on the worksheet and highlight any data that seems to be in support or in agreement with other
areas of your research. Do not use the Bible as your source for your arguments.

Visual and Auditory Communication Work page
Society reacts to many controversial subjects by communicating their viewpoints through music and art. You will see demonstrations

using visual stimuli, musicians will write lyrics to express their feelings through a song. History is recorded through its music and

art. By looking
at a society’s cultural reaction to a subject you will learn much about the why’s and how’s of peoples’ reactions to topics. Look at

the time period of your topic; look at what was happening locally, at the societal level and globally at that time. You will find

numerous methods of
expression on an equally expansive variety of topics. Take time to look at how the people felt and how they chose to express

themselves.

Science and Math Research Work page
Use this section to find scientific evidence or proof to support your position. Make sure you use more than one study and that you look

at the data and the sample that it was taken from. Present your statistical data in a clear concise manner using visuals such as graphs

and charts.

Language and Culture Work page
What is being written about the subject? What books and newspaper articles were being written to address the subject at the time or in

retrospect? Is their literature from other countries addressing this topic? Global concerns need a global response. Look for how other

cultures
address your topic. Are their language barriers that affect your topic or the dissemination of information? Enter literature written at

or about your time period onto your timeline. Reflect on what was being said.

Social Science Work page
What is society’s economic reaction to this topic? Look at the impact on the economy as a whole as well as the impact on the

individual. Are we looking at philosophical differences, social and religious differences? If you are looking at the sociological

impact, look for cultural influences such as beliefs, values, norms and mores. Look for group influences, pressures for conformity,

dynamics of social change, conflict, prejudice and aggression. When looking at psychology, look at individual behavior,
human development, motivation, emotions, social thinking and attitudes and actions. Look politically at the power of government, the

rights of individuals vs. the protection of common good and the impact that
groups have on laws.
System and Network Security
Individual project, Mesut Gümüştaş, 2015
Requisites:
This link: http://www.olsonet.com/AFIB_SE/contents.html points to the requisite collection of files
comprising 1) the lecture slides, 2) an encrypted file named encrypted.txt.
Your tasks:
The file has been encrypted using a rather naive algorithm described below. Your task is to decrypt
the file, for which you will have to write a program (in a programming language of your choice).
The algorithm is based on a block cipher applied in CBC mode (see slide 157). The block size is 8
bytes which is also the key size. The (extremely naive) block encryption function is a
straightforward XOR of the block bytes with the key bytes (one by one). For illustration, supposing
that the key is:
0x13 0xf2 0xcc 0x19 0x15 0xb6 0x7e 0xff
the block:
0xe0 0x24 0x3c 0x1f 0x22 0x4e 0x81 0xda
will encrypt to:
0xf3 0xd6 0xf0 0x06 0x37 0xf8 0xff 0x25
Before encryption, the plaintext file is expanded to the nearest multiple of 8 bytes (by appending a
pertinent number of zero bytes at the end). Then, one extra 8-byte block is added to the file whose
consecutive bytes encode the original length of the plaintext file in little-endian notation. This way,
the file to be encrypted always consists of an entire number of blocks. For example, a file with this
sequence of bytes:
0xf3 0xd6 0xf0 0x06 0x37 0xf8 0xff 0x25
0x13 0xf2 0xcc 0x19 0x15 0xb6 0x7e 0xff
0xe0 0x24 0x3c 0x1f 0x22
(consisting of 21 bytes) will be transformed into:
0xf3 0xd6 0xf0 0x06 0x37 0xf8 0xff 0x25
0x13 0xf2 0xcc 0x19 0x15 0xb6 0x7e 0xff
0xe0 0x24 0x3c 0x1f 0x22 0x00 0x00 0x00
0x15 0x00 0x00 0x00 0x00 0x00 0x00 0x00
Then the transformed file is encrypted (as illustrated in slide 157) using a random 8-byte
initialization vector IV. The initialization vector is included as the first block of the encrypted file.
Thus, for example, the encrypted version of the above sample file will consist of 40 bytes (8 bytes
of IV followed by four encrypted blocks of the expanded input file.
Write a program implementing encryption/decryption according to the algorithm described above.
Then apply your program to decrypt the file encrypted.txt, which has been encrypted with this key:
0x3e 0x99 0x18 0xfe 0xba 0xc4 0xad 0x11
The file should decrypt into a sequence of ASCII characters amounting to a meaningful piece of
text. Please submit that text along with your program and its brief description. You will have to
present your solution in person.
Please let me know when you are ready. We will then set up an appointment for your presentation
which will be followed by an 1 hour written test.

http://www.olsonet.com/AFIB_SI/contents.html
http://www.olsonet.com/AFIB_SE/contents.html

© 2020 customphdthesis.com. All Rights Reserved. | Disclaimer: for assistance purposes only. These custom papers should be used with proper reference.