Monday, September 30, 2019

Mongol Change and Continuity

Matthew Choi Period 4 11/25/12 MONGOLS CCOT ESSAY The Mongols were a vast and influential empire that spread throughout Eurasia. From the time of Genghis Khan to the Yuan dynasty, the Mongols experienced numerous changes in their lifestyle and leadership as they strayed from their nomadic ancestry. However, while they experienced some changes, they still clung tightly to their culture until the end of the empire. Genghis Khan was the founder and emperor of the great Mongol Empire, and as a result, it became the largest contiguous land empire in all of history.Genghis Khan sought to unify the Mongols, and conquered nomadic Mongol tribes, unifying them at Karakorum, the capital of the Mongolian Empire. Whether on the battlefield or at home, Genghis was famous for his ruthless brutality. For example, when he defeated Mongol clans, he boiled all of their chiefs alive while killing all males taller than a wheel. As a result, he struck fear into the hearts of men women and children, and al l that he opposed viewed the Mongols as an invincible empire.In 1211 Genghis Khan broke through the Great Wall of China, which the Chinese thought was an ultimate defense; but when Genghis pierced it, they were terrified by his seemingly undefeatable army. He spread his influence across central and Southeast Asia during his reign, but he could not conquer Japan because of divine kamikaze winds and the Mongol fleet was destroyed. This proved that the Mongols were not an invincible force, they could be killed, and this shifted the peoples view on the Great Khan.The Pax Mongolica, or â€Å"The Mongolian Peace† was a time period that lasted for about a century during the Mongol Empire. During this time, intercontinental trade flourished because of the reopened trade routes, including the Silk Road. This time period is also used to describe the stabilization of the Mongol culture. While traveling through the routes and conquering other lands, the Mongols kept to their nomadic ance stry. They lived in Mongol yurts, which were portable dwellings made of pelts and ooden poles, and these were ideal for nomadic travel. The geography of Central Asia consist of deserts and grassy landscapes, where agriculture is hard to support. The nomads focused on the domestication of strong and healthy grazing animals so the Mongols would have enough food, shelter, and clothing. Mongol nomads travelled often, and they had to use the teachings of their ancestors in order to survive. Genghis Khan’s knowledge of his nomadic ancestry is probably one of the biggest reasons why the Mongolian army was so successful.

Sunday, September 29, 2019

Foreign Currency Risk

FOREIGN CURRENCY RISK Q1. Jack is a UK based car exporter who exports luxury cars and has a competitor in Germany; he has recently seen a change in foreign currency that pound ( £) of UK has strengthened against euro (â‚ ¬) of Germany. What is the type of risk does Jack face in his business? (MCQ)Credit RiskTranslation Risk Economic Risk Transaction Risk(2 marks) Q2. Yarn Co is multinational business & wants its foreign subsidiary financial statements. They are making exchange losses when the accounting results of its foreign subsidiary are translated into the home currency. Which type of currency risk does Yarn Co face? (MCQ)Netting off RiskTranslation Risk Economic Risk Hedging Risk(2 marks) Q3. Saito Co, a USA based fish exporter has competition with Sakkara Co based in Bangladesh. He believes he faces an economic risk in the business. What type of impact does it have on Saito Co? (MCQ)Direct ImpactIndirect ImpactPolitical ImpactEconomic Impact(2 marks) Q4. The current spot rate of UK ( £) to USA ($) is  £3:$1.5. The interest rates per annum are UK 5% & USA 9%. What will be the two-month forward rate (to the nearest two decimal places)? (FIB)4013204318000 £ :$1(2 marks) Q5. The current spot rate of UK ( £) is  £3. The inflation rate per annum of UK is 3% & the expected future six-month spot rate is  £3.06. Calculate the foreign annual inflation rate? (FIB)501656223000%(2 marks) Q6. Which of the following statements relates to International Fisher Effect? (MCQ)The exchange rates of countries depending on inflation ratesThe exchange rates of countries depending on interest ratesPrices are same to different customers in an economyNominal interest rate differentials between countries provide an unbiased predictor of future changes in spot exchange rates.(2 marks) Q7. Which of the following differences will result in an Expectation Theory? (MRQ)The difference in Inflation RatesDifference between Spot & Forward RatesThe difference of Interest RatesDifference between Spot & Future Rates(2 marks) Q8. Select the appropriate theory with the following statements. (P&D)Depreciation of forwarding rates will be due to high-interest rates Differences in nominal rates due inflation rates A commodity is priced same in every country The forward rate is a fair predictor of the spot rate in the future EXPECTATION THEORY PURCHASING POWER PARITY THEORY INTERNATIONAL FISHER EFFECT INTEREST RATE PARITY THEORY(2 marks) Q9. Patio Co. operates in the USA. They will be receiving a payment of  £2,500 from customers in four months' time. Calculate Patio Co.'s receipts in four months' time? Use the following rates. (MCQ)Spot Rate  £1.4/$ –  £1.6/$4 Month Forward Rate  £1.8/$ –  £2.0/$$1,786$1,563$1,389$1,250(2 marks) Q10. Fray Co is a USA based company ; imports Robots from China. The usual credit period is three months. Fray Co has to pay  ¥60,000. Calculate the loss/gain of the payment on forwarding contract? (MCQ)Spot Rate  ¥1.321/$ –  ¥1.521/$3 Month Forward Rate  ¥1.654/$ –  ¥1.854/$$7,085 (Loss)$9,144 (Loss)$9,144 (Gain)$7,085 (Gain)(2 marks) Q11. PXG Co, a UK based company has made $3,600 sale to its USA customer on credit. The current  £/$ exchange rate is  £6.4/$12.8. It is expected that UK  £ will strengthen by 15%, by the time USA customer pays. Calculate the receipts in  £? (MCQ) £244.57 £281.25 £489.13 £562.5(2 marks) Q12. The dollar is quoted at a $0.067 premium for the forward rate. The current exchange rate is $/ ¥ 1.0005 +/- 0.0045. What will a $4,900 payment convert at forwarding rate? (MCQ) ¥4,876 ¥4,920 ¥5,224 ¥5,274(2 marks) Q13. A UK based company Bib Co will receive a foreign payment of $2,000 in four months' time. The spot rate is $1.1/ £ – $1.4/ £. Calculate the income in four months' time using money market hedging? (MCQ) Borrow DepositDollar ($) 4% 5%Pounds ( £) 3% 2% £1,414.4 £1,419.4 £1,800 £1,807(2 marks) This information is used for Q14, Q15 ; Q16.A USA based company has to make a payment of  £95,000 in nine months' time. The spot rate is  £2.2/$ –  £2.5/$. Following details are:Borrow DepositDollar ($) 7% 5%Pounds ( £) 5% 3% Q14. Calculate the foreign payment using money market hedging? (MCQ) $37,164$42,232$43,816$44,449(2 marks) Q15. Calculate the foreign payment if the nine-month forward rate is  £2.37/$ –  £2.71/$? (FIB)3511551206500$ (2 marks) Q16. Calculate the gain/loss for the company for not leading the payment? (MCQ)$4,365 (Gain)$4,365 (Loss)$3,816 (Loss)$3,816 (Gain)(2 marks) Q17. Following statements relate to Forwarding contracts. (HA)An immediate binding contract TRUE FALSEThe forward rate is variable in nature TRUE FALSEThe timing of the contract is unknown TRUE FALSE(2 marks) Q18. A company wants to reduce its transaction risks when conducting business with foreign receivables/payables. Following statements are said by the directors during this years' AGM. Select the appropriate statements to reduce the risk. (MRQ) â€Å"The company should hold back its payments for few months†, this technique is Leading†The company should continue as normal†Ã¢â‚¬ I have some friends offshore who work in a bank, I may able to arrange a foreign account for the company† said by a director†The company should deal in the foreign currency only† (2 marks) Q19. Juab Co is a manufacturing company ; has a foreign supplier who supplies raw materials. Recently the supplier has now become a customer as well, who purchases Juab Co.'s finished products and sells in his respective country. Which technique of reducing risk is applicable for Juab Co? (MCQ) Money market contractLeading & LaggingForward market hedgingMatching & Netting(2 marks) Q20. Which of the following statements are true in relation to futures? (MRQ)Currency futures are standard contractsA high premium is paid initiallyFutures are available in all currencies offered by the bankFuture contracts are binding (2 marks) Q21. A company wants to hedge itself from any currency risk. They have decided to hedge themselves using currency futures. They have to make a payment in May of $36,000. The futures have a contract size of $15,000. Which of the following futures will they select? (MCQ)Buy three futures on MarchSell two futures of MarchBuy two futures of JuneBuy three futures of September(2 marks) Q22. Select the appropriate option in relation to futures. (HA) Transaction cost is lowest ADVANTAGE DISADVANTAGEContracts are limited to some currencies ADVANTAGE DISADVANTAGEThe exact date does not have to be known ADVANTAGE DISADVANTAGE(2 marks) Q23. Picots Co is UK based company which has a lot of foreign customers. It will be receiving a payment from USA based customer of $500,000 in five months. The company has been advised to use derivatives to hedge themselves against any currency risk. If they opt for currency options which of the following are correct? (MCQ)Buying a USA $ call option in the UKBuying a USA $ put option in the UKBuying a UK  £ call option in the USABuying a UK  £ put option in the USA (2 marks) Q24. Which of the following statements relate to currency options? (MRQ)In future the market becomes favorable and the company will face a loss because it is bound to the contractThey are negotiated Cannot be traded in all currenciesEasily arranged & Flexible (2 marks) Q25. Which of the following is incorrect for swaps? (MCQ)It is negotiated between two parties having their own spot rateIt has a nominal costIt is an over the counter dealIt has multiple markets (2 marks) Q26. Which of the following has a refundable cost? (MCQ)Currency FuturesForward ContractsCurrency OptionsCurrency Swaps(2 marks) FOREIGN CURRENCY RISK (ANSWERS) Q1. CEconomic risk is the variation in the value of the business due to unexpected changes in exchange rates. This is an indirect impact on Jacks business. Q2. BThey are making exchange losses when the accounting results of its foreign subsidiary are translated into the home currency. This is an indication of Translation Risk. Q3. AIt is a direct impact on Saito Co as the USA being home currency strengthens then foreign competitors Sakkara Co in Bangladesh is able to gain sales at your expense because your fish have become more expensive in the eyes of customers both abroad and at home. Q4.  £3.02Interest rate parity theory = 3 Ãâ€" 1+(9% Ãâ€" 212)1+(5% Ãâ€"212) =  £3.02 Q5. 7%Purchasing power parity theory = 3 Ãâ€" 1+(x% Ãâ€" 612)1+(3% Ãâ€"612) =  £3.06X% = 7% Q6. DThe exchange rates of countries depending on inflation rates (Purchasing Power Parity Theory)The exchange rates of countries depending on interest rates (Interest Rate Parity Theory)Prices are same to different customers in an economy. The law of one price. (Purchasing Power Parity Theory)Nominal interest rate differentials between countries provide an unbiased predictor of future changes in spot exchange rates. (International Fisher Effect) Q7. When these two will become equal, Expectation Theory arises. Difference between Spot & Forward RatesDifference between Spot & Future Rates Q8.Depreciation of forwarding rates will be due to high-interest rates INTEREST RATE PARITY THEORYDifferences in nominal rates due to inflation rates INTERNATIONAL FISHER EFFECTA commodity is priced same in every country PURCHASING POWER PARITY THEORYThe forward rate is a fair predictor of the spot rate in the future EXPECTATION THEORY Q9. DReceipts =  £2,500 à · 2.0 = $1,250Q10.Payment (Forward) =  ¥60,000 à · 1.654 = $36,276Payment (Spot) =  ¥60,000 à · 1.321 = $45,420Gain = $9,144Q11. AFuture Rate = $12.8 Ãâ€" 115% = $14.72Receipts =  £3,600 à · 14.72 = $244.57 Q12. DThe Spot rate = $0.996/ ¥ – $1.005/ ¥ -/+ 0.0045The dollar is at a premium so subtract it as if dollar strengthens then yen will weaken in the forwards market. The new Spot rate = $0.929/ ¥ – $0.938/ ¥ – 0.067Payment = $4,900 à · 0.929 =  ¥5,274 Q13. BBorrow Foreign Currency = $2,000 à · [1 + (4% Ãâ€" 4/12)] = $1,974Convert Foreign to Local = $1,974 à · 1.4 =  £1,410Deposit (Interest) = (1,410 Ãâ€" 2% Ãâ€" 4/12) =  £9.4Total Receipts =  £1,410 +  £9.4 =  £1,419.4 Q14. DDeposit Foreign Currency =  £95,000 à · [1 + (3% Ãâ€" 9/12)] =  £92,910Convert Foreign to Local =  £92,910 à · 2.2 = $42,232Deposit (Interest) = ($42,232 Ãâ€" 7% Ãâ€" 9/12) = $2,217Total Payments = $42,232 + $2,217 = $44,449 Q15. $40,084Payments =  £95,000 à · 2.37 = $40,084Q16. BQ17. An immediate binding contract TRUE The forward rate is variable in nature FALSEThe timing of the contract is unknown FALSE Q18.†The company should hold back its payments for few months†, this technique is Lagging (Incorrect)†The company should continue as normal† This refers the company should take no action (Correct)†I have some friends offshore who work in a bank, I may able to arrange a foreign account for the company† said by a director. This statement indicates opening a foreign bank account. (Correct)†The company should deal in the foreign currency only† The company could deal in home currency rather in foreign currency (Incorrect) Q19. DThis technique attempts to match the same foreign currency receipt & payments due at the same time. The netting of the intra debit & credit balances saving transaction cost & reducing risk. Q20.Currency futures are standard contracts, fixed limits specified (True)A high premium is paid initially, this is applicable in options (False)Futures are available in all currencies offered by the bank, Only in few currencies (False)Future contracts are binding, they have to be closed (True) Q21. CThe Futures can be bought or sold only four times a year which are March, June, September & December. Future contracts can be signed relating to a month after the date of receipt. They will buy two futures each of $15,000 and the remaining $6,000 can be hedged using other techniques. (E.g. forward contracts) Q22. Transaction cost is lowest ADVANTAGE Contracts are limited to some currencies DISADVANTAGEThe exact date does not have to be known ADVANTAGE Q23. BPicots Co will want to sell the USA $ when they receive the payment which is why they will use USA $ put (sell) option bought in the UK. Q24. In future the market becomes favorable and the company will face a loss because it is bound to the contract, this statement relates to future contracts They are negotiated, this statement relates to options (Correct) Cannot be traded in all currencies, it is a disadvantage hence this statement relates to options (Correct)Easily arranged & Flexible, this statement relates to swaps Q25. DIt has no markets; it is a tailor-made an agreement between two parties.Q26. ACurrency Futures, An initial margin cost which is refundableForward Contracts, has a transaction costCurrency Options, A non-refundable premium costCurrency Swaps, No initial cost

Saturday, September 28, 2019

The internship assignment Essay Example | Topics and Well Written Essays - 1000 words

The internship assignment - Essay Example The internship assignment The customers need their ordered products on time and therefore, vendors have to attain a certain levels of synergy and coordination among various departments in order to achieve the desired outcomes of a specific project. The job that was performed during the internship was all about conforming by the deadlines. I managed to perform the job quite well as I was able to promote teamwork and synergies among the entire workforce. It was significantly challenging for me to combine various members from several departments in order to build cross-functional teams. The team developmental process was halted and jammed more than a few occasions. The difficulties were faced because there was a presence of particular distaste and unwillingness towards the notion of working closely among technical and managerial staff. Both of the groups held on to the point that the other group does not have necessary information needed to comprehend the issues. But I with the help top management sponsored a le arning environment in the overall organization and therefore, played a significant and important role in the completion of delayed projects. My job as a coordinator in a software development company assisted me to get important knowledge about the global industry of software development and sales. The industry has spread in all parts of the world and due to this reason I have gotten an unforgettable chance to interact and communicate with people from various cultures and nations. As a sales representative, I have also noticed a few marked differences in the behavior of people from under developed and advanced nations respectively. The customers belonging from formerly mentioned group of nations set a premium on cost effectiveness of information technology solutions. The buyers from latter type of countries focus on quality and they are least concerned with the price tag of the product. The clientele of the company where I worked is culturally and regionally dispersed. I have found Americans with very professional attitude and they were extremely lenient in terms of providing extension in deadlines. The Chinese and Russian s on the other hand, were very aggressive in handling delays. In short, I have come to recognize that the population of developed nations is far more polite and humble. But the customers from less developed nations are very annoying and they got on my nerves on more than one instances. Yet I remained calm and composed while handling their grievances. More specifically, I have learned that the culture is the software of human mind (Hofstede & Hofstede, 2010) and therefore, people use their cultural and economic experiences for making decisions. The economic conditions of the less developed world have been continuously degrading. The abovementioned trend has forced companies in less developed world to outsource technology to more developed ones. But the companies from less developed world are highly sensitive towards prices and therefore, they always search for the cost effective technological solutions. I have also learned that those companies with poor computer and technological lit eracy cannot use the solutions to the full extent. Nevertheless, I will propose intensive technological training to all companies that are looking to acquire latest infrastructure. In my view, state of the art technology is useless until the staff knows how to use it. In the case of major number of the companies, technology results in less

Friday, September 27, 2019

Identy theft Essay Example | Topics and Well Written Essays - 750 words

Identy theft - Essay Example A high percentage of credit card companies send out checks for the purpose of paying off other cards, or to use like cash. The checks often arrive with your statements, and are sometimes sent separately. As the consumer, you do not know when they are sent. Unfortunately, some of the credit card companies do not know when they send them. The criminals can get their hands on your checks in many ways. They can be stolen right out of your mailbox. They can be misappropriated by a postal employee. They can be shanghaied with other mail from a mail truck. There are probably a hundred other methods, but you get the picture, it is easy for the criminal to get his or her grubby hands on your financial documents. The most successful approach is a proactive one. The most effective solution is to ensure the checks are not sent at all, and to this end I recommend you cancel your credit cards. If you have no credit cards, you will receive no credit card checks. At a minimum, call all of your credit card companies and ask them to stop sending the checks, they will be happy to oblige. Another approach is to have them sent only upon your request. This way you can still have the use of the checks, and you can track roughly when, and how many, are sent. You might ignore this advice, as I would have at an... The check clearing companies do not care about consumers, they do not even use the driver's license information that most proprietors verify when a check is written! If you are unlucky enough to have this happen to you, you will undoubtedly be shocked, as I was, to hear the police tell you that you are not the victim! The victims are the stores that cashed the check, or the check clearing companies, because they will eventually be the ones with actual monetary losses. These steps are just the first of many if you truly want to protect yourself. They will potentially save you; a lot of grief, time spent trying to get agencies to help, a considerable amount of money, frustration, and stress in general. For more information, check out . This site is an excellent entry point for you to educate yourself about the many aspects of identity theft. Protect yourself, be proactive, and tell everyone you know the same. Brochure Front cover: IDENTITY THEFT AN INVISIBLE CRIME Victims of identity theft usually do not even know that they have been targeted until it is to late. Identity theft can take years and a lot of money to clear up, and until it is credit is ruined and lives are destroyed. As with other crimes we cannot completely control if we are victims, but we can be aware how criminals obtain our private information, how to reduce the risk of being a victim and some helpful information on what to do after the crime is committed. Inside How Does Our Private Information Fall Into The Wrong Hands Stealing records from their employer, Bribing an employee who has access to these records, or Hacking into the organization's computers. Rummage through your trash Obtain

Thursday, September 26, 2019

Assignment Essay Example | Topics and Well Written Essays - 500 words - 40

Assignment - Essay Example Other strengths include the expansion of the democratic space that has seen the women’s suffrage that allowed women to vote, and civil rights movements. All this events have occurred without causing an uprising against the liberal supreme rule of law. Religious pluralism represents another strength of classical liberalism (Crowards, 1995, p, 21). This has provide the best record of non-violent religious pluralism across the earth. Christians in the US from various denominations, Muslims, Hindus, Atheists, Jews, and Budhists live in peace as opposed to areas that apply a different form of leadership. Classical liberalism give a chance to the people to be leading immovators and producers in the world. Revealed and stated preference techniques belong to the discerned environmental decision-making processes, which rank individual preferences above and other element during the analysis and in the process ranking lowest the systems that escape direct application of individual preferences. They depend on advice and opinion from professional panels, policy makers, and other stakeholder groups when these decisionsAmong the areas analysed include putting emphasis on individual preferences above management concepts of complicated environmental systems yet the individual has little information that sometimes is inaccurate of any merit. According to them, this is one of the reasons informed people need to participate. It is essential to remember that at this moment, it is good to comprehend the particular role of information that informs the knowledge of individual preferences (Edwards, 1992, p. 43). Furthermore, considering the function of information in policy and assessment of damages is important. Environmental decision-making processes differ basing on either professional’s point view or preference of individuals. The striking difference between these approaches starts with disagreements over the concept of economic value used inputs. The inputs

Wednesday, September 25, 2019

Interest groups Dissertation Example | Topics and Well Written Essays - 10000 words

Interest groups - Dissertation Example This paper studies how the roles of the interest groups within the modern day American politics has shaped up, and how these roles are translated to bring out a true message for the Americans. What is even more significant here is the fact that this study aims to find which strategies are made use of by these interest groups to achieve their respective goals as far as the lengths and breadths of United States are concerned. Also the due role of the National Rifle Association as an interest group has been detailed within this discussion which only adds meat to it in the long run. ... inquire about the areas where interest groups have been able to provide their services and to see if these areas have any political perspectives present as well To explore the due role of the National Rifle Association as an interest group that has done much for the United States over a passage of time Methodology The methodology used within this paper is entirely dependent on the usage of secondary research which is the research that has been gained through evidence and available resources. The secondary research always comes ahead with the passage of time and is manifested through books, journals, newspapers, magazines, periodicals, TV interviews and reports, etc. The methodology lists down the areas from which information has been extracted for the completion of this study and the manner in which it has been done suggests the authenticity that is much required for this paper. The Role Played by the Interest Groups in American Politics Interest groups within the United States are b uilt up in such a way that they have their respective aims and objectives. The reasons why they exist are difficult to ascertain because they are serving the interests of varied stakeholders. The manner in which they operate is visible to everyone yet they exist to make sure that their interests are met in a priority basis. These interest groups have their own vested interests and they can go to any limit to make sure that they are recognized, their work done in a proper way and the results are such that nearly everyone can see and decipher easily. Now how these interest groups bring success is dependent on how well they have been devised in the first place. If these interest groups are working to satisfy a general audience, then the interests will remain broad but if these interest groups

Tuesday, September 24, 2019

Reader&report Assignment Example | Topics and Well Written Essays - 250 words

Reader&report - Assignment Example The author takes us to the eccentric climes of Newfoundland, in Canada, where the brutal forces of nature offer a chilling setting to a sometimes strange, sometimes lovable tale of a straightforward, gentleman called Quoyle. Quoyle marries the Petal his first wife who does not give him any attention; their marriage ends up being very destructive (Annie 12). Petal, his wife, hates herself, Quoyle, and their two daughters. She uses most of her time drinking as well as searching for love in the beds of different men. Quoyle loves Petal incessantly and maintains his commitment to her, their marriage, as well as their daughters. Quoyle is lastly freed from the marriage when his wife dies in a car accident together with one of her lovers (Annie 46). Quoyles aunt comes to assist him together with his children after the death of Petal and encourages Quoyle to move away for a new beginning. They then move to their ancestral home in Killick-Claw, Newfoundland. Quoyle arrives at their new home a discouraged, grieving and isolated with less accomplishment in life because always he has been told he cannot do anything correct (Annie 67). As time goes on, Quoyle gets a job of covering the shipping news. He as well meets a widowed woman, called Wavey, whom he is attracted to. The two enjoy each other’s company, but the past experience prevents them from getting closer. Later, Quole is promoted to be a managing editor at the paper by surprise. At last, he is able to move on from his past and marry Wavey (Annie 84). Quole finds out that loving again is achievable, and it does not have to include destruction and

Monday, September 23, 2019

Organisational Ethics in OPEN24 Essay Example | Topics and Well Written Essays - 1750 words

Organisational Ethics in OPEN24 - Essay Example For a company organization is a means to an end in order to achieve its goals. In this sense, organizations can be distinguished into two fundamentally different sets of objectives: The team of financial advisors is highly focused, trained up and very aggressive sellers, they concentrate on non walk-in customers and their objective is the selling of business loans. Increasing competition in the marketplace combined with rather draconian cultural internal problems such as bureaucracy, poor communication, and perceived lack of personal job advancement possibilities has led the employees to high levels of frustration many times in the past. 'All organisations begin with some sort of Vision, an initial spark which causes its creation. The organisation's Vision is essentially the dream which unites a core group of people and inspires them to try and make the dream a reality.' We can say that Open24 has a vision on what it wants to achieve in the near future. All employees work towards these visions and indeed if they work as group, then there is no reason as to why they should not achieve their organisational goals. Open24 organisation's pur...'All organisations begin with some sort of Vision, an initial spark which causes its creation. The organisation's Vision is essentially the dream which unites a core group of people and inspires them to try and make the dream a reality.' We can say that Open24 has a vision on what it wants to achieve in the near future. All employees work towards these visions and indeed if they work as group, then there is no reason as to why they should not achieve their organisational goals. (Ping, 1996)Â   Open24 organisation's purpose grew from their vision and in articulating its mission; they should have stated how it will seek to bring the vision to reality. 'It is stating what its 'Unique reason for being' is, and what the values are that will give meaning to its purpose.' (Ping, 1996) When it comes to organisational ethics, it is here in the mission statement that the seed is planted which gives rise to the 'shared set of beliefs' that will determine the organisation's climate of opinion. (Ping, 1996)Â   The main problems that the department faces and can prevent from the above mentioned plans are the following: Strict Management that creates employee dissatisfaction thus, high employee turnover ratio.Poor communication. Internal competition between OPEN 24 and the main net of Eurobank's branches. Â  

Sunday, September 22, 2019

International Business and operations Management Essay

International Business and operations Management - Essay Example In China there are many existing domestic firms (over 8,000) engaged in the production and sale of agricultural equipment while a substantial number of international reputable firms have made major inroads into the Chinese farm machinery market. To understand international business ventures, Peng et al (2009) through their unified international business framework suggest two approaches in understanding international business frameworks. These are the institution-based view whereby the foreign venture firms aims at developing an understanding of the local business environment; and the resource-based view in which the firm utilizes its competitive advantage like superior technology or products to gain a foothold in the local markets. China as one of the fastest developing emerging markets provide a highly developed potential market for agricultural equipment due to its large population and lowly mechanized farming methods hence is a viable entry point into the Asian region market. International strategic management mainly encompasses firms engaged in cross-border trade globally that usually take advantage of local resources in diverse geographical locations to enhance their productivity and returns. Lessard (2003) has identified four strategic frameworks that distinguish these international firms: geographic span of the particular industry; the pull of the specific locations including the markets, resources, and the competitive edge; upholding of the international strategy; and the extent of global incorporation including the localized spread. The western and northern parts of China however have not greatly enjoyed the rapid growth experienced in other regions of the country. The government has therefore consequently provided incentives to foreign firms interested in expanding in these regions in form of lowered statutory requirements and other inducements as well as providing a high-quality communication and

Saturday, September 21, 2019

Intelligence Reform Essay Example for Free

Intelligence Reform Essay Brief Background The aftermath of the 9/11 tragedy has caused the US Federal Government to re-assess the setback and possible flaws of their homeland security defense. To primarily focus on investigating the tragedy, in November 27th 2002, the US Congress and President Bush commissioned a ten-man panel that comprised the National Commission on Terrorist Attacks Upon the United States, which is known as the 9/11 Commission.   The 9/11 Commission expedited the investigation process and came up with a two-pronged framework based on the assessment. This two-pronged framework consists of the framing of action at a global perspective and the formulation of action at the domestic domain. The homeland security aspect has been emphasized and related by the 9/11 Commission with strong urgency for implementation and recommended it to Congress and the President. In addition, the commission also suggested the enactment of immediate measures that deal with the intelligence and enforcement agencies and the military organizations. Moreover, the US government has enacted several inter-agency programs that are highly supported by Congress and President Bush. Thus, the nationalization of homeland strategic programs has formally resulted in the Intelligence Reform and Terrorism Prevention Act (IRTPA) on January 20th 2004. In this regard, this paper will discuss the intelligence components of the IRTPA and measure its performance throughout the intelligence community while comparing it with the recommendations of the 9/11 Commission. On these bases, a conclusive evaluation will discuss the impact of IRTPA to reform the national intelligence community. An Update Briefer This update briefer is used to keep abreast with the situation of the intelligence reform in retrospect of the discussion throughout this paper. The paper will also form relevance to the background of concerns affecting the IRTPA. Basically, according to critics, â€Å"the Bush administration is in its seven years of intelligence fiasco which controls more than 80% of America’s $60 billion intelligence budget—reflective of Secretary of Defense Robert Gates’ streamlining the Pentagon’s trail on national security policy and intelligence as he work hand in hand with Director of National Intelligence (DNI) Michael McConnell—he gradually assert civilian control over the key spy agencies funded by the defense budget and held Pentagon’s effort to create its own intelligence machinery independent of the CIA† . This criticism could somehow be founded on the discretion of the President and put into perspective the 9/11 Commission Recommendation No.13.2 which states that: â€Å"the current position of Director of Central Intelligence (DNI) should be replaced by a National Intelligence Director (NID) with two main areas of responsibility; (1) to oversee national intelligence centers on specific subjects of interest across the U.S. government and (2) to manage the national intelligence program and oversee the agencies that contribute to it† . At hindsight, the intelligence fund may have lead to criticism because the teaming up of Pentagon with the CIA requires substantial budget allocation primarily due to the realignment of budget appropriation to intelligence activities. The Framing of Global Strategy This section of the paper will discuss the 9/11 Commission’s framing of global strategy that defines the action of security measures at international perspective, as follows: Reflection on Generational Challenge The 9/11 Commission has determined and defined the conceptual framework of knowing their enemies by familiarizing the historical origin and doctrines that instilled in their adversaries desires to wage war against America. Basically, familiarizing with the enemy is also familiarizing with the combative measures used in defining or assessing the formidable threat. It was found that terrorism is not only an act of vengeance to kill and destroy but is also based on the doctrines of Islamist secessionism which means that the allied forces and not only America is at risk of terrorist attacks. In this regard, familiarizing with enemy requires the use of all elements of national power: diplomacy, intelligence, covert action, law enforcement, economic policy, foreign aid, public diplomacy, and homeland defense. By reflecting on the situation and knowing the enemies, the challenge lies on the achievable tactical and strategically managed plan of action for short and long term implementation. Attacking terrorists and their organizations The collaborative diplomatic ties with allied governments focuses on a campaign to thwart the terrorist attacks by means of information exchange and expanding the open-source of intelligence information, intensifying military operations and sharing of financial resources to allied government’s counter-terrorism programs.   The conduct of war on terrorism has been installed at all frontiers of defense ranging from domestic and international boundaries. The strategy being employed is to know better the enemies but more on identifying the perpetrators of terrorism. The coercive action in condemning the so-called â€Å"cowardice attack to US soil† has been proven in the fall of Baghdad and the capturing of Iraqi tyrant Saddam Hussein, a close ally of al-Qaeda leader Osama Bin Laden. The war on terrorism is treated with broadened understanding by the 9/11 Commission. Preventing the Continued Growth of Islamist Terrorism According to former US Defense Secretary Donald Rumsfeld , the battle of ideas is between the question of enforcing law to prevent terrorist attacks and the question of just merely killing them the moment they commit the crime. Capturing terrorists, whether they are suspected or proven otherwise, would strategically achieve security defense. In addition, isolating the enemy and putting them into peripheries is another tactical form of beating them.   In contrast to Rumsfeld’s claim, the 9/11 Commission has tackled the importance of the UN’s declaration of human rights and some principles on Articles of War of the Geneva Convention. It briefly explains the humane treatment of the enemy of the state even when they are captured in combat zones—as mostly terrorist prefer to hide in strife-torn areas—or at the actual scene of the crime which are non-combat zones and urban population areas. In a way, the act of capturing an enemy is employed with strategic treatment and debriefing on the circumstance of indoctrination, specifically to familiarize with the Islamic doctrines in a tactical aspect. At a glance, it is a minimal gain to extract information from a captured terrorist because most of them are suicidal and would rather bring with them to their grave the classified information they know or possess. In relation to adopt more sustainable strategies at the global perspective, a 6-point framework is as follows: 1. Turning a national strategy into a coalition strategy refers to fostering a broader alliance in various governmental representation from its domestic or homeland relations to international cooperation; 2. Proliferation of weapons of mass destruction refers to supporting the call of the UN Security Council to all members and all allied states to disarmament of lethal weaponry that may result a genocide of the human race; 3. Strengthen counter proliferation efforts refers to act on counter-measures for countries that condone the exchange of lethal weaponry or weapons of mass destruction; 4. Expand the proliferation security initiative refers to expanding the open-source information in aid of intelligence access and exchange; 5. Support the cooperative threat reduction program refers to the retrieval of potentially useable weaponry or armaments that has been stockpiled during the war—which may be availably used by terrorists; 6. Targeting terrorist money refers to acting on financial embargo or halting the financial flow on the nature of funds that is being used by terrorists in funding their terrorist activities. Protection and preparation for terrorist attacks The continuing assessment and monitoring of potential threats of terrorist attacks to US homeland in particular and international communities of allied governments in general are being put into heightened configuration of security measures. The stabilization of preparedness programs and protective laws on immigration would minimize the burdens of terrorist threats. The crossing of borders is employed with modernized technological facilities and physical security system that would limit the terrorist’s mobilization or in-and out-country deployment. Likewise, travel advisory reduces the vulnerability of citizens to plunge into hotspots or terrorist bailiwicks. Defending the Homeland The 9/11 Commission has formulated recommendations with encompassing urgent actions for the US government to consolidate and mobilize troops and agencies. The key functional agenda is patterned after the global strategy that tackled the US homeland defense system. The following are the recommendations based on â€Å"How to do it? A different Way of Organizing the Government† : Unity of Effort Across the Foreign-Domestic Divide The recommendation called for jointly undertaking action in the sourcing of integrated intelligence through the establishment of a National Counter-Terrorism Center which has a mandate that resembles the Terrorist Threat Integration Center. The NCTC manages the joint operational and intelligence activities. Unity of Effort in the Intelligence Community Streamlining the flow of intelligence by organizing the key positions of authority, in which a National Intelligence Director manages the joint operational and intelligence centers, replacing the CIA’s Director of Central Intelligence. Unity of effort in Sharing Information The President’s mandate is called for unifying the functions of the government through mobilizing all governmental agencies to engage in information gathering and international cooperation with allied governments for information sharing. Unity of Effort in the Congress This calls for the establishment of a fully functional Congressional body that creates strong security policies and strengthens the homeland security. The unity of effort in Congress creates a policy structure that addresses the judicial and legal processes of security measures that manifests the sovereign interest of the people. Organizing America’s Defenses in the United States Institutionalizing the framework of intelligence—aside from the existing intelligence agencies—through a unified and managed specialty agency that is mandated to specifically organize the homeland defense basically results in the creation of the Department of Homeland Security. Transforming the Intelligence Work and Issues on Reforms In January 20th 2004, the US Congress enacted the Intelligence Reform and Terrorism Prevention Act of 2004 (IRTPA). The primary purpose of IRTPA is to reform the intelligence community and the intelligence and intelligence-related activities of the United States Government . The transformation of intelligence work has found relevance in the enactment of IRTPA, in which the Office of the Director of National Intelligence (ODNI) has worked closely in the framing of the IRTPA as a law. According to ODNI, â€Å"a great structural change has occurred in the passing of IRTPA† . Stressing on the structural change, the ODNI has reformed its capabilities in managing the flow of human intelligence (HUMINT) as their open-source of information. Reforming the capabilities also enabled the optimization of both human and financial resources in managing the operations. The reform in the ODNI has substantially addressed the key operational issues affecting the intelligence community and is abl e to put into perspective the intelligence work on counter-terrorism, in order to fully manage the homeland defense system. In a Senate inquiry on the progress of intelligence reform in January 23rd 2007, the ODNI was inquired with several issues. First, they were asked about the agency performance in which Sen. John Warner pointed out â€Å"the progress thus far achieved by ODNI is ten percent† . Second, they were questioned on the effectiveness of managing the clandestine operation of the CIA using the HUMINT (human intelligence) in information sharing from open-sources, which apparently still need more refinements from the point of view of organizational management. Furthermore, the performance of the ODNI, as it reported its achievements, has shown defects in its organizational aspect. Due to these defects, the Senate inquiry hinted on an organizational review and suggested the recall of the clandestine operation as further inquired on the assurance of the best intelligence from the Iraq Study Group (ISG), which have achieved tactical and strategic intelligence. The conclusion of the Senate inquiry presumed on the issue of reform, which does not manifest in the ODNI’s organizational capability to benchmark the achievements of goals and the CIA’s clandestine work. A brief review of the literature shows that the ODNI may have been in the stage of adaptability to the structural change embodied in its organizational mandate by virtue of the IRTPA. Another consideration is the underlying performance of the ODNI in streamlining its goals which has affected the benchmarking of short and long term operational plans in the field and which has merely given due management by the CIA in its clandestine operation in using the HUMINT. At this point, the reform in intelligence community work was supposed to be measured by the expected assertiveness of the ODNI—as the 9/11 Commission recommended that the ODNI be designated as the agency that implements joint operational and joint intelligence work and replace some aspect of intelligence work of the CIA. Retrieval of Operation to Manifest Reform In an effort to fully address the key issues to manifest reform in the structural change brought about by IRTPA and legislative pressures, the retrieval of operation in the organizational function of ODNI has been resolved by the US Senate through the approval of the Fiscal Year 2008 Intelligence Act which â€Å"would emanate a more aggressive role to the ODNI in coordinating with the intelligence community† . The Senate Bill has surpassed the ODNI’s will of authority and retrieval of its operation that is being realigned to fully act on its function as a frontline agency in executing its mandate given by IRTPA. The degree and scope of authority of the ODNI is then expected to ventilate the reform in the intelligence community so as to re-examine the burdens and defects of work ranging from ministerial execution to field implementation. Moreover, an added feature that empowers the ODNI is the streamlining of bureaucracy in the formulation and execution of operating plans. Basically, reducing the involved authorities may expedite and resolutely implement the overall function and coverage of intelligence work. Likewise, the ODNI has been given the authority to appropriate budget thereby earmarking the fund for its National Intelligence Program. It would then be up to the ODNI to utilize and mobilize the resources that would be used to reform in the intelligence community. Conclusion The determination and identification of the 9/11 Commission for a global strategy has basically created the framework for the US homeland defense system. On the other hand, the recommendations have strongly moved the US government’s Executive, Legislative, and Judiciary branches which have enacted the IRTPA of 2004. In addition, the ODNI, as the body acting on intelligence mobilization, would require substantial budget allocation. Analyzing the enactment of IRTPA may be likened to a sword and an armor in which the bearer is the ODNI. In this regard, it can then be said that the US government has created an executioner of war on terrorism. Moreover, the degree and scope of authority vested upon the ODNI may be perceived as an ultimate implementer of capturing the world’s update. However, in some degrees, the reform in intelligence community may be burdened by domestic resistance from figures belonging to allied governments that oppose US foreign policy. Generally, the reform that was achieved by the US homeland defense system is the consolidation of its intelligence enforcement agencies and mobilization of its resources and strategies towards global perspective. The re-structuring of intelligence framework may be described as an art of war or a one-step backward, two-step forward move, which pursues the enemy outside its homeland while minimizing casualties. With this perception, the war on terrorism has been brought to the backyard of allied governments. It may be additionally perceived at the militarist point of view that the reform in intelligence community could reduce the expense of war in order to achieve the socio-economic-political gains from the war zones. Bibliography Donald Rumsfeld Interview on Jan. 30, 2004. Bremer-Sonnenberg Commission on Terrorism; in 9/11 Commission Report, Chapter 12, Page 374. (2004) ISBN 0-16- 072304-3. IRTPA of 2004. â€Å"Introductory Page†. 108th Congress of US, Second Session, 20 January 2004. http://www.asksam.com/ebooks/intelReformAct/. (accessed 01 March 2008). Office of the Director of National Intelligence (ODNI) 2007. â€Å"Progress on Intelligence Reform to Senate Select Committee on Intelligence†. Transcript: Progress on Intelligence Reform. http://www.dni.gov/testimonies/20070123_transcript.pdf. (accessed 01 March 2008). Richard A. Best Jr. and Alfred Cumming, 2007. â€Å"Director of National Intelligence Statutory Authorities: Status and Proposals,† CRS Report to Congress, http://www.fas.org/sgp/crs/intel/RL34231.pdf. (accessed 01 March 2008). Tim Shorrock. â€Å"Revisiting Intelligence Reform†, Foreign Policy in Focus, 6 December 2007. http://www.fpif.org (accessed 01 March 2008). US Senate Inquiry, 2007. â€Å"Statement for the Record by the Office of the Director of National Intelligence (ODNI) to the Senate Select Committee on Intelligence†. http://www.dni.gov/testimonies/20070123_testimony.pdf. (accessed 01 March 2008). 9/11 Commission Report. â€Å"How to do it? A different Way of Organizing the Government†. Chapter 13, Page 399-428. (2004) ISBN 0-16-072304-3. 9/11 Commission Report. â€Å"Unity of Effort in the Intelligence Community†. Recommendation No. 13.2. Chapter 13, Page 407-415. (2004) ISBN 0-16-072304-3. 9/11 Commission Report. â€Å"What To Do? A Global Strategy†. Chapter 12, Page 361- 383. (2004) ISBN 0-16-072304-3.

Friday, September 20, 2019

An Introduction To Encryption And Decryption

An Introduction To Encryption And Decryption CHAPTER 1 This thesis proposes a VHSIC Hardware Description Language (VHDL) design of Encryption and Decryption Algorithm for Data. In this chapter, the challenges of cryptography is firstly presented. This chapter also briefly discusses the problem definition, scope of work and the thesis objectives are also highlighted.Finally, the chapter end with the chapter organization. The dissertation presentation is provided at the end 1.1 An introduction to Encryption and Decryption, a type of cryptography Encryption and Decryption, a type of cryptography, refers to the process of scrambling information so that the observer cannot be detecting the data. Cryptographic key is a piece of data used to encrypt or decrypt to plaintext. (Alex Brennen V., 2004) The Crypto, from the word cryptographic mean is it has its origins in the Greek word KRUOTOS, which means hidden. Thus the objective of cryptography is to hide information so that only the intended recipient can read it.[2] . Cryptographic is a protocol or method of performing encryption and decryption (Alex Brennen V., 2004). There are two types of cryptographic: symmetric and asymmetric key. Figure 1.1 is example a symmetric cryptographic has a single key, which is used for both encrypting and decrypting information. Data Encryption and Decryption is a well-known example of symmetric cryptographic. In symmetric cryptographic, public-key cryptographic uses complementary pair of keys to divided the process of encryption and decryption. This process is shown in Figure 1.2. This part is discuss about the symmetric-key cryptographic only.[3]. The proposed projects is to create the algor ithms where it is use to convert of information, rearranging the original massage produce output referred as ciphertext Plaintext Plaintext Ciphertext Key Figure 1.1: Symmetric Cryptographic Plaintext Plaintext Ciphertext Encryption Key and Decryption Key Figure 1.2: Public-Key Cryptographic 1.2 Problem Statement At present there are many encryption and decryption, especially in the communication system provided in a variety of application. Encryption and decryption is particularly impacted in the field of military communications and reliable security data to protection for transmitting. This ciphertext is used in the military is to send information such as direction, strategy, secret codes and other information that can not be know by the national foe during the war.[4] Creating this system is the process by which information can not be detect by the national foe. The information can not be recognizing by the national foe because this system is using the process to encrypt data and decrypt data. [4] 1.3 Scopes of Work Based on available software resources, limited time frame and expertise, this research project is narrowed down to the following scope of work: 1. The project is only to design fixed 64-bit input of data block size, 64-bit output of data block size and 56-bit of key size based on an Encryption and Decryption algorithm . 2. The projects is limited to design, to synthesis, to simulate and to verify the design in Altera Quartus II software. Objective The project are to create a system that can protect electronic data (secret information) which Consist of encryption and decryption process and to fully design an encryption and decryption algorithm using VHDL. The objectives of this project are To understand how the Encryption and Decryption process. To fully design an Encryption algorithm and Decryption algorithm using VHDL. Encryption and decryption which support 64-bit input of data block size, 64-bit output of data block size and 56-bit of key size. To make use Quartus II software as a design and synthesis tool. 1.4 Chapter Organization Chapter 1: This chapter starts with an Introduction which highlights the problems under investigation by describing the status of problem conceptually and theoretically. It contains the introduction of the thesis, problem statement and scope of study, objective of the project, and the chapter organization. Chapter 2: This chapter is a Literature Review that compiles the studies done by others based on the title of the project. Under the literature review, this chapter discussed on the features need to be include in designing the system. Chapter 3:. The methodology chapter describes the steps that has been taken while doing the project from the beginning until the end. The main content of the chapter are the flow charts and the description of each step of the process. Chapter 4: This chapter presents the result of the algorithm and discussion observed. The results obtained are presented as a series of figures, tables, with textual description and discussion. The analysis outcome of the research is also discussed in relation to the evidences obtained from project work and theories reported in Literature Review . Chapter 5: The chapter is the Conclusion of the thesis and which signalized the whole project a done CHAPTER 2 LITERATURE REVIEW 2.0. Overview This chapter is to introduce the host range of background information and research for this thesis. Most methods have been widely used to determine how the process of encryption and decryption. Theoretical method is presented using the VHDL. Chooses the VHDL programming for design encryption and decryption because this programming is very direct forward is compare other programming. For example Cadence and C++ programming. Both programming is very complicated. In this chapter, the Literature review of the research is discussed. The main topics discussed in this chapter are shown below: Symmetric cryptography Encryption Decryption Operations of Encryption and Decryption Data Encryption and Decryption VHDL (VHSIC Hardware Description Language) 2.1. Symmetric key cryptography The symmetric key scheme is the conventional method of cryptography. The scheme uses the similar key to encode and decode in information. In a symmetric key algorithm, in the normal case, the communication only uses only one key. For example if Z user Z sends the secret symmetric key to an X user before the start of the communication between them. Part Z and X use the same symmetric key to encryption and decryption the message. Encryption and Decryption are example of symmetric key algorithm. Figure 2.2 shows the symmetric key cryptography. The symmetric key algorithm is faster than an asymmetric key algorithm. There are two classes of symmetric key cryptography as block ciphers and stream ciphers. [6] Plaintext X Plaintext Z Encryption and Decryption Symmetric Key Figure 2.1: The symmetric key cryptography 2.2 Block Cipher Block cipher is a type of symmetric-key decryption and encryption algorithm. The symmetric-key decryption and encryption that is a fixed length block of plaintext data into block ciphertext data. The block size is 64 bit. The block size can be upgrade to 128 bit, 256 bit or 512 bit if the process becomes advanced. Block ciphers operate on large blocks of data. The encryption and decryption of plaintext with a block cipher will result in the same when the same key is used. From the figure 2.3, it can be seen that show the Block Cipher Plaintext Plaintext Block Cipher Encryption and Block Cipher Decryption Symmetric Key Figure 2.2: Block Cipher 2.3 Stream Cipher Stream cipher is a type of symmetric encryption and decryption algorithm. Stream ciphers much faster than any block cipher. Stream ciphers operate on smaller units of plaintext. The encryption and decryption of plaintext with a stream cipher will result in the same when the same key is used. From the figure 2.3, it can be seen that show the Stream Cipher Plaintext Plaintext Stream Cipher Encryption and Stream Cipher Decryption Symmetric Key Figure 2.2: Stream Cipher Advantages of Symmetric Key Cryptography The main advantages of symmetric key (public key) cryptography are improved security and expediency. Other major advantages from the symmetric key (public key) are that they can provide a technique for digital signatures. Verification via secret-key system requires a shared secret and sometimes requires trust of a third party. For example, Kerberos verification system involves a button-secret data center that stores copies of all user secret key. An attack on the database will enable the falsification of the system. Public key verification, on the other hand, prevents of rejection, and each user has a responsibility to protect his private key. [7] 2.3 Disadvantages of Symmetric -Key Cryptography The disadvantage of symmetric cryptography is that it presumes two parties have agreed on a key and been able to exchange that key in a secure manner prior to communication. This is a significant challenge. Symmetric algorithms are usually mixed with public key algorithms to obtain a blend of security and speed. Disadvantage of using symmetric-key cryptography for encryption and decryption is faster. There are popular secret-key encryption and decryption technique that are considerably faster than any at present available symmetric-key encryption and decryption technique. However, public-key cryptography can be used by means of secret-key cryptography to obtain the optimum of both worlds. For encryption, the optimum solution is to join together with public-key and secret-key systems in order to obtain both the security advantages of public-key systems and the velocity advantages of secret-key systems. The public-key system can be make use of to encrypt a secret key which is make use of to encrypt the bulk of a information or message. Public-key cryptography may be vulnerable to impersonation, although, also furthermore if usersà ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒ ¢Ã¢â‚¬Å¾Ã‚ ¢ private keys are not available. A successful assail attack pounce on a certification authority will permit a national foe to impersonate whomever the adversary pick out to by using a public-key certificate from the compromised authority to bind a key of the national foe choice to the name of another user In some plight, public-key cryptography is not obligatory and secret-key cryptography alone is enough. This belonging to environments where secure secret-key assent can take place, for example by users confluence in private. It also belonging environments where a sole authority knows and manages all the keys. Formerly the authority knows everyoneà ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒ ¢Ã¢â‚¬Å¾Ã‚ ¢s keys already there is not much excess for some to be public and others private. And yet, public-key cryptography is normally not obligatory in a single-user environment. Example, if want to keep personal message or information encrypted, can do so with any secret-key encryption algorithm using personal password as the secret key. Furthermore, public-key cryptography is optimum equivalent for an open multi-user environment. Public-key cryptography is not intention to substitute secret-key cryptography, but nevertheless to complementary it, to make it more safety [8] 2.4 Encryption Encryption is a form of cryptography that to change the plaintext into ciphertext. A cipher is a algorithms for the encryption. Encryption is the principle of such security step as digital signatures, digital certificates, and the public key infrastructure. Computer-based encryption method use keys to encrypt and decrypt information. A key is in binary number. The key is one part of the encryption process. It must be used in connection with an encryption algorithm to generate the cipher text. Encryption is the symmetric or asymmetric. Ciphers were repeatedly used directly for Encryption without supplement procedures such as ratification. The extremely used kind of encryption is symmetric Encryption, which is aptly named for the reason that it uses one key for both the encryption and decryption system [9] 2.5 Decryption Decryption is the opposite or moving from the ciphertext back to the plaintext. A cipher is a algorithms for the decryption. The specification operation of a cipher is to manage with both by the algorithm and in each example by a key. Decryption is the symmetric or asymmetric. Ciphers were repeatedly used directly for decryption without supplement procedures such as ratification. The extremely used kind of decryption is symmetric decryption, which is aptly named for the reason that it uses one key for both the encryption and decryption system [10]. 2.6 Operations of Encryption and Decryption An encryption and decryption scheme consists of three Standard algorithms: A Key Generation Algorithm. For a symmetric key, this is often an algorithm that simply picks a random key of a certain length. The symmetric key scheme is the conventional method of cryptography. The scheme uses the similar key to encode and decode in information. An Encryption Algorithm. This takes as input a message (or plaintext) and some kind of key, and outputs a ciphertext. Encryption is to change the plaintext into ciphertext A decryption algorithm. This takes as input a ciphertext and some kind of key, and outputs a message.Decryption is to change the ciphertext back to the plaintext 2.7 Data Encryption and Decryption This system works by encrypting and decrypting groups of only 64 message bits, which is the same as 16 hexadecimal number. To do the encryption and decryption, this system uses symmetric keys where are also apparently 16 hexadecimal number long, or 64 bits long. However, every 8th key bit is ignored in this algorithm, so that the effective key size is 56 bits. But, in any case, 64 bits (16 hexadecimal digits) is the round number upon which Encryption and Decryption is organized. The process is explain in Figure 1.2, it can be seen that the process of encrypt and decrypt, if take the plaintext message is 2872762F771B15E8, and encrypt it with the key 0000000000000001, the ciphertext produced 1234567890987654. If the ciphertext is decrypted with the same secret key 0000000000000001, the result is the original plaintext 2872762F771B15E8. Input data 2872762F771B15E8 Key Encryption Ciphertext 123345678890987654 Key Decryption Key Original input 2872762F771B15E8 Figure 1.2: Simple Block Diagram Process Encryption and Decryption using Feistel Algorithm 2.4 VHDL History (VHSIC Hardware Description Language) In order to complete the design, the VHDL is one of the most important tools used. Device description language VHDL is a great acronym stands for the Very High Speed Integrated Circuit Hardware Description language. It was originally developed on the orders of the U.S Department of Defense. They need a more efficient way to document the behavior of the ASIC design service companies were present.[11,12] It was developed as an alternative to the huge, highly complex manuals that were the norm. The idea to simulate such a description was immediately an attractive prospect and logic simulators were developed could take a VHDL description as input. From here synthesis to the hardware level became a focus of study and still is. Current state-of the- art synthesis tools can create hardware for a large subset of the VHDL language and should at least support the synthesizable subset in IEEE1076.6-1999. The syntax of VHDL was derived from Ada, with constructs added to handle the parallelism th at appears in hardware designs. The language is strongly typed and case insensitive. [13,14] The initial version of the language that was presented in the IEEE standard 1076-1987 was somewhat limited and a new version appeared in 1993 in IEEE standard 1079-1993, which improved the consistency of the language. There have been various reviews and updates to the standard of the languages since, but the 1993 version is the most prominent and widely used. Both versions of the language ignored the need for a multi-valued logic type which is where the IEEE standard 1164 comes in.[15] This standard defines a 9-valued logic type called standard logic. This has become the standard type to use for multi-valued logic in VHDL descriptions. The language has been further extended in a series of libraries. One such library is the numeric std library which implements a signed and unsigned type. These types allow for arithmetic to be performed on arbitrarily sized logic vectors. [16] 2.4 VHDL (VHSIC Hardware Description Language) In order to complete the design, the VHDL is one of the most important tools used. Device description language VHDL is a great acronym stands for the Very High Speed Integrated Circuit Hardware Description language. It was originally developed on the orders of the Department of Defense. They need a more efficient way to document the behavior of the ASIC design service companies were present.[ represented 11,12] VHDL (VHSIC Hardware Description Language) was originally adopted by the U.S Department of Defense. The initial version of VHDL, designed to IEEE standard 1076-1987, included a wide range of data types, including numerical (integer and real), logical (bit and boolean), character and time, plus arrays of bit called bit_vector and of character called string. [16] [1] Laura E.Hunter,Brian Barber,Melissa Craft,Norris L.Johnson Jr,Jeffery A Martin,Tony Piltzecker. MCSE. Implementing PKI in a Window Server 2003 Network.Chapter 4.Page 185 [2] Mohan Krishnamurthy, Eric S.Seagren, Raven Alder, Aaron W.Bayles, Josh Burke, Skip Carter Eli Faskha How to Cheat at Securing Linux.page:250 [3] Dr.Everett F.Carter jr,Jeremy Faircloth,Curtis Franklin jr,Larry Loeb, Hack Proofing XML Page:193 [4] The Point Of Encryption By Dr.Colin Walter,Available at http://www.securitydocs.com/pdf/3301/PDF [5] Aram Khalili, Department of Computer Science, University of Maryland. Available at http://www.cs.umd.edu/~waa/414-F01/symmetric.pdf [6] D. Richard Kuhn ,Vincent C. Hu ,W. Timothy Polk, Shu-Jen Chang ,National Institute of Standards and Technology Introduction to Public Key Technology and the Federal PKI Infrastructure [6.5] Contributed by LE Webmaster Kerberos Authentication System Available at http://www.linuxexposed.com/index2.php? option=com_contentdo_pdf [7]. Advantaged of Public-Key Cryptography ,Available at http://users.hack.gr/dij/crypto/overview/publickey.html [8] Disadvantages of Public-Key Cryptography ,Available at http://x5.net/faqs/crypto/q4.html [9] Manuel Mogollon University Of Dallas USA.Cryptography and Security services. Page: 51 [10] Mohan Krishnamurthy, Eric S.Seagren,Raven Alder, Aaron W.Bayles,Josh Burke,Skip Carter Eli Faskha How To Cheat at Securing Linux .page:251 [11]. Copyright  © 1999 by John F. Wakerly Combinational Logic Design Principles,The VHDL Hardware Design Language. Page :1-35. [12] Deepak Jain . Object Oriented Programming Constructs in VHSIC Hardware Description Language, Delhi Institute of Advanced Studies [13] Institute of Electrical and Electronics Engineers, IEEE 1076-1987: IEEE Standard VHDL Language Reference Manual, 1987 [14] Institute of Electrical and Electronics Engineers, IEEE Std 1076.6-1999: IEEE Standard for VHDL Register Transfer Level (RTL) synthesis, 1999. [15] Institute of Electrical and Electronics Engineers, IEEE 1076-1993: IEEE Standard VHDL Language Reference Manual, 1993. [16] E.P.M. van Diggele. Translation of SystemC to Synthesizable VHDL, MSc Thesis, Delft University of Technology.