Free Essay

Im Pretty

In:

Submitted By aackiie
Words 2373
Pages 10
Local Transport Plans: Case Study

2:1:b

DEVELOPING A LOCAL GOVERNMENT TRANSPORT
MASTERPLAN: CASE STUDY
J. Lebo, World Bank (1999)
Objectives of the case study
National or state rural planning processes are often “top down”, technically sophisticated and, hence not geared to participation from local communities, those most affected. Involvement of local government is increasingly seen as being important to rural transport planning and engaging them in this process requires a balancing of the technical requirements of the process with local objectives and capacities. A Rural Transport infrastructure (RTI) planning process must be transparent and easily understood by local government planners who may have little grasp of the underpinning economics. The objective of this case study is to describe the development of a Local Government Transport Masterplan (LGTMP).

1. AN APPROACH TO LOCAL GOVERNMENT INVESTMENT PLANNING
In most developing countries, decentralization has meant that local governments are increasingly made fully responsible for the provision of local services, including health, education, as well as local roads. Concurrently, national or state road planning processes are often "top-down" and technically sophisticated, as well as ignoring the potential for local governments and communities to participate. The involvement of local governments, however, has been shown to be a critical element to the success of the RTI planning process. In practice, however, most local governments still rely heavily on central government engineers and economist, or externally funded consultants, to assist them in road planning process or to set local priorities for them.
Engaging local governments in the process of road planning, requires a balancing of the technical requirements of the planning process with local objectives and capacities. An appropriate RTI planning method must therefore be transparent and easily understood by local government planners, who may have limited understanding of the underpinning economics. A key tool for enabling such a local government planning process is use of a transport master plan.

2. DEVELOPMENT OF A LOCAL GOVERNMENT TRANSPORT MASTER
PLAN
In many countries, the requirements for the development of a Local Government
Transport Master Plan (LGTMP) will be set out as part of the national sector policy or as part of an explicit national rural transport policy and strategy. The plans themselves can be prepared by local government planning agencies in collaboration with the communities and assisted by local consultants. Alternatively, the entire

Rural Transport Knowledge Base

1

Rural Travel and Transport Program 2001

Local Transport Plans: Case Study

2:1:b

process might be contracted out to experienced consultants by local government or community representatives combined in "joint-services" committees.
Because of the need for interaction between all levels of planning and decision making, the local government master plan should be prepared in a participatory, simultaneously “bottom-up” and “top-down,” approach. Key stakeholders should therefore be involved in the formulation of a LGTMP from the beginning and will include, for example, representatives from the a focal rural road agency (e.g. Ministry of Local Government), provincial road agencies, local government road agencies, university institutes, and rural transport services providers. From the private sector, involvement should come from local and international NGOs locally active in the rural transport sector, rural transport services providers, local NMT and IMT manufacturers and service providers, community leaders, farmers association representatives, etc.
For logistical ease, it will be necessary to bring together the identified partners in a workshop or other interactive format. From a regional or district-level, a useful starting point for discussing rural access investments can be human or economic development objectives of the government or other participating agencies. Most developing countries already try to prioritize their public expenditures and policy actions according to the impact on development and poverty alleviation, and many will have stated poverty reduction plans. Local governments are usually sensitive to the social and economic development needs of local communities, and should be encouraged to translated these into network development goals and strategies.
Although the final objective of the workshop will be to develop a transport master plan, a series of steps are necessary to ensure understanding and agreement among stakeholders, including:


Establishment of the “as is” plan. An "as is" plan should be undertaken by local government road agency planners (and may require the assistance of a specialist of the focal entity, or by a consultant or NGO) in close consultation with the local road agency and the communities. Such plans should show the existing RTI network, including roads, tracks and paths and should indicate the condition and utilization of the individual links, as well as major obstacles and constraints. The map should contain major trip generating facilities, such as agricultural production areas, markets, schools, health centers, water collection points etc. The plan also must show the higher-level transport network and the inter-connections between the systems.



Scenario Analysis. Possible improvement scenarios should then be worked out in a participatory workshop-style framework, jointly with the communities, or their representatives and with the local government planners. The consultant or representative of the focal entity will act as a facilitator and will ensure that the principles of the country’s rural transport policy are considered. Basic principles for the establishment of the plan should be equity and economic development.
The focus needs to be on cost-effective removal of access constraints on the entire
RTI network, including roads, tracks, and paths.

Rural Transport Knowledge Base

2

Rural Travel and Transport Program 2001

Local Transport Plans: Case Study



2:1:b

Selection of Investments. Cost estimates for proposed options for RTI improvements need to be made and ranked using agreed procedures. On the basis of the results, a consultative process with as many groups of the area as possible needs to take place thereafter. An effort should be made to gain the input of vulnerable groups and, in particular, women.

2.1 Establishment of the “as is” plan
The situation most often faced by the local government rural transport planners is an existing but deteriorated network of roads, tracks and paths, many of which are passable only in the dry season with difficulty, and not at all in the rainy season.
There are very limited resources available for maintenance, let alone new investment.
At the same time, when budgets for investment become available, there is often political pressure to use these scare resources to upgrade certain links to the highest affordable standard (typically bitumen or a formed gravel surface). Very little attention is typically paid to basic access RTI.
An effective LGTMP requires sufficient information for planning, which starts with an assessment of the physical situation. This includes an assessment of the extent and condition of the RTI network and its linkages to the overall transport system, an assessment of the rural transport demand, the services provided, their costs and the means of transport available, as well as information on the quality and location of services. Furthermore, in order to make a realistic assessment of engineering requirements, the climatic, soils, and topographic factors need to be taken into account, as well as alternative approaches for implementation of works (e.g., community contracting, labor-based methods, etc.).
The first step for planning RTI investments will be to integrate the physical data on the RTI network with the necessary socio-economic data. Most of the necessary data can be obtain as part of low-cost road inventory and condition survey for the network under consideration—conducted by local engineers or consultants in consultation with local communities. The condition survey should allow planners to assess the expenditure and types of works necessary to bring the particular link under consideration to the agree minimum standard (e.g., the least-cost intervention necessary to ensure all-season motorablity). For roads that are possible candidates for additional investment (e.g., high standard gravel or sealed surface) a cost estimate for possible upgrading should also be made.
Socio-economic data on the location of population, markets, health facilities, etc. can be collected from the respective national or local government planning agency, for example, census data. A database can then be established which contains the following data for each piece of RTI or section under consideration: road name, jurisdiction, length, RTI type, number of bridges and cross-drainage facilities, overall conditions, passability during rainy season, population served, and current levels of traffic. This data can be represented in tabular form (Table 1) or graphical form
(Figure 1).

Rural Transport Knowledge Base

3

Rural Travel and Transport Program 2001

Local Transport Plans: Case Study

2:1:b

Table 1: Basic Road Link Information for "as is" Plan
Identifier
999
Sub-district
Karimnagar
Locale
Huzurabad
Road Name
Musthabad to Pothgal
Total Length
40 km
Length Proposed for Intervention
40 km
Population Served by Road
4,400
Category of work
Spot Improvement
Total Cost
205,000
Cost per Km
5,125
Cost per 1000 Population
46.59
Overall Condition
Poor
Estimated Traffic
18
Passable during Rain Season Y/N
N
Figure 1: Typical Local Government Road Network "as is" Map
= market center
= district capital
= national road
= state road
= district road
Population
> 15,000
1000 > < 14999
< 1000

2.2 Scenario Analysis
Once necessary information has been collected, various scenarios for intervention can be examined by workshop participants. As mentioned above, this should be an inclusive process, whereby communities, planners, and private sector interests are brought together around an "as is" plan to discuss possible strategies. The first step will be to ensure that financial and managerial responsibilities for the investments under consideration are well-defined and understood by all parties. For example, if

Rural Transport Knowledge Base

4

Rural Travel and Transport Program 2001

Local Transport Plans: Case Study

2:1:b

community roads and paths are to be improved, arrangements for community involvement (e.g., cost sharing arrangements and contracting) need to be clarified and understood among local government and community representatives. An effective financial and managerial framework is a perquisite for an effective investments strategy, and if no such arrangements exist, details should be worked out prior to any new investment.
Box 1: Selection Criteria for the Screening of Local Government Roads
Road selection and work planning and programming requires more precise information and therefore needs to be complemented by additional information including an assessment of past performance of the rural road agency responsible for implementation and planning. Proposed variables for analysis include:
Extent and condition of the network (to ensure the maintenance of existing infrastructure): a.
Kilometers of local government roads, community roads, tracks, and paths.
b.
Number of bridges and water crossings.
c.
Links to the rest of the road network.
Socio-economic factors:
a.
Population along specific roads and paths.
b.
Importance of road for links to markets, education, health, administrative services, and so on.
c.
Economic potential of the area, such as number and type of businesses, shops, and markets.
Measures of use:
a.
Vehicle kilometers (trucks, cars).
b.
Fuel sales.
c.
Marketable agricultural output and potential output.
d.
Area of cultivated land.
Accessibility constraints to be overcome and costs:
a.
Number of structures (culverts, bridges) at bottleneck points.
b.
Condition of roads or tracks (such as number of months during which they are passable c.
Engineering costs of intervention.
Capacity of districts:
a.
To raise revenue for cost sharing—what are sources and collection rates?
b.
To apply for, use, and account for funds
c.
To undertake maintenance by contract (number of firms available to bid.
d.
To provide appropriately priced labor for labor-intensive works.
Adapted from: Malmberg Calvo, 1998.
In practice, the investment selection process usually begins with a screening of the entire network to eliminate roads that are to be excluded from consideration. Of course, national and state roads within local government jurisdiction can be

Rural Transport Knowledge Base

5

Rural Travel and Transport Program 2001

Local Transport Plans: Case Study

2:1:b

eliminated from the LGTMP, since these will be responsibility of the respective higher-level agency. Similarly, existing roads in good condition can be excluded, since their needs will be covered under maintenance budgets. Others might be eliminated on the basis that they do not serve access needs (intra-village roads, tracks or paths) or are owned by local communities or private users (private access roads).
Examples of criteria commonly used to screen local government RTI interventions are given in Box 1.
The "as is" plan will also serve as the basis for a discussion of appropriate engineering strategies. Performance standards for each level of the network should be discussed and agreed upon among planners, communities, and contractors. The first focus should be the setting of a minimum standard (the minimum works necessary to ensuring all-season passability) for the lowest volume part of the network. For higher volume roads, where upgrading might be considered, clear criteria should be established for when upgrading will take place based on indicators of use (traffic levels) and costs, for example, economic cost-benefit analysis. However, since most of the RTI network will be made up of transport infrastructure with very low traffic
(e.g., less than 50 VPD), the main focus of discuss should be how to select and prioritize investments on links with poor all-season passablity.
From an engineering perspective, an effort should be made to avoid promoting excessive performance standards (e.g., those based on surface quality or travel speeds), and focus on finding innovative low-cost solutions for broadening an agreed minimum standard of access. For example, significant cost savings can be had by focusing on low-cost interventions and spot improvement strategies and accepting occasional access interruptions (flooding at fords or closure to heavy traffic during monsoon seasons), and an effective spot improvements strategy, although often more complex to implement than a fully engineering road, can reduce investments needs five to ten fold.

KEY REFERENCES
Lebo J (1999), Setting priorities for rural transport infrastructure investments.
Washington D.C. : World Bank
Malmberg Calvo (1998).Options for managing and financing rural transport infrastructure. World Bank Technical Paper 409. Washington D.C: World Bank
Riverson J, J Gaviria and S Thriscutt (1991). Rural Roads in Sub-Saharan Africa:
Lessons from World Bank Experience. Technical Paper 141, Africa Technical
Department Series. Washington D.C: World Bank

Rural Transport Knowledge Base

6

Rural Travel and Transport Program 2001

Similar Documents

Premium Essay

Shahaporan

...at country’s leading pharmaceutical company, world reputed Square Pharmaceuticals Limited (SPL) and was placed under one of the most important departments in the company Product Management Department (PMD). I have found the experience to be quite interesting and under the guidance of my supervisors and with the help of all the members of the department I have tried my level best to prepare an effective report on the above mentioned topic. The report contains the trend analysis of generic shifting, the reasons behind it and future potentiality of certain generic shifting events and SPL’s planning in the present scenario. Here I have gathered data and information through actual interviews of product managers and secondary data from IMS software and Research department of the organization (MRPC). I honestly hope that my analysis will help to give the idea how generic shifting event occur in the pharmaceutical market in Bangladesh and performance of different brands of different generics in the market. I hope you will find this report worth all the labor I have...

Words: 26333 - Pages: 106

Free Essay

Human Resource

...territory and product structuring, field alignment and related queries. * Making reports regarding performance of our products with their competitors * For launching new products, provide suitable and potential information to the marketing staff about the molecule and segments as well as highlight those areas where we have boost our business. * Make monthly reports brick wise performance , Territory wise performance ,Product wise performance ,Regions and District wise performance , Outlet wise performance * Besides making above reports, different kind of reports are developed as per the requirement of immediate boss * Using Software PLD( Pharmacy Level Data) * Using Software Sales Analyzer * Using Software IMS Plus * Using IMS Black book Organization : Helix Pharma (Private ) Limited. Over All Duration : Jan 2012 up March 2014 Previous Designation : Sales Analysis Officer Previous Responsibilities: * As a Marketing Sales Analyst, My Responsibilities Includes...

Words: 657 - Pages: 3

Premium Essay

E-Commerce Who's Absent and Who's Not

...great absentees of the social media. Out of fifty pharmaceuticals included in a social media use study, only ten had an identifiable presence on social media. Several articles had been written about what they call the "Pharma­Socmephobia." A very interesting study from IMS Institute dedicates over 40 pages to explore, discuss and analyze the reasons, the pros and cons of this behavior. By ignoring social media pharmaceuticals are missing on great information for product development, key opinion leader identification and monitoring. Social media are a tool to listen to customer ideas and feedback, and collaborate with social groups to test products and services. As stated by IMS Pharmaceutical companies cannot afford to delay their entry into these ever evolving and increasingly significant new channels of communication. "Early movers will test the water with an educated trial and error approach and discover benefits for the company as a whole while moving closer to consumers and patients."(Social, 2014) Hard copies of healthcare information decreased in importance while online researchers for healthcare information went from 25% on 2000 to 72% of Americans and 82% among Europeans on 2012 according to IMS study. It is mandatory by FDA when advertising healthcare products FDA to include risk information in the main body...

Words: 516 - Pages: 3

Free Essay

Dietary Assesment

...changed, and this is especially true for romantic films, which in the last few years have become cultural product of consumption that calm the thirst of emotions and entertains audiences. We are been living in a decade where materialism, coldness, and convenience stands out compared to previous decades. A clear example of this are the romantic films of the 90s compared to the present romantic films. For example, when we look at the 1990 movie Pretty Woman, we can see that there is a gallant man, and the conquest and elegance prevails. However, when we look at the 2007 movie Good Luck Chuck, we can realize that there is nothing alike in this romantic film, or in this decade. It was only after comparing the courtly manners of the man, the intensity of the sensual scenes, and the song soundtracks of the two films, that it can be determined that there are several differences and similarities between the two romantic films. At first glance, comparing the 90s romantic films to the present romantic films, we can clearly appreciate that in the movie Pretty Woman, the character Edward (Richard Gere), demonstrates a high level of elegance and gentleman in how he treats Vivian (Julia Roberts), speaks to her, and how he expresses himself. In addition, how could anyone forget the scene where he puts a diamond necklace on her neck, and tells her how beautiful is. In contrast, the male character in Good Luck Chuck, Dr. Charlie Logan (Dane Cook), seems to consider that this formality in the twenty-first...

Words: 616 - Pages: 3

Free Essay

Pretty Woman a Romantic Comedy

...Pretty Woman: A Romantic Comedy The popular romantic comedy, Pretty Woman, is a story that shows how members of two different social classes meet and become forced to learn about each other's way of life and fall in love in the process (Garnham). Edward, (Richard Gere) is the upper-class businessman who coincidentally meets Vivian, (Julia Roberts), a lower-class prostitute, while trying to find his way back to his hotel after a fancy gathering of co-workers and other members of his elite society. After staying with Edward for a period of time, Vivian becomes assimilated into his upper-class way of life. While Vivian is learning how to fit into the upper echelons of society, Edward also learns how life is for the lower class. "Every society is marked by inequality, with some people having more money, schooling, health, and power than others. With its predictable plot, simple conflict and easy resolution, simple characters that the audience relates to, and the notion that one character saves the other, this film is the very definition of a romantic comedy. The predictable plot. This particular aspect of romantic comedies both explains their continued popularity and remains one of the hallmarks of this particular genre. Romantic comedies almost always follow the basic formula: Two people who are not supposed to be together somehow manage to fall in love. Hijinks and other mishaps ensue, they get into a huge fight, and then everything ends happily ever after (Garnham). This film...

Words: 1398 - Pages: 6

Free Essay

Everythin About Women

...being teased by Clairee Belcher (Olympia Dukakis). The women interact mostly in the home-based beauty salon owned by Truvy Jones (Dolly Parton). Truvy’s good friend, M’Lynn Eatenton (Sally Fields), and her daughter, Shelby (Julia Roberts), are frequent patrons. The movie centers on Shelby, who is a diabetic, gets married and wants to have a child. Her mother is worried because childbirth would put too much stress on Shelby’s body. Shelby is strong willed and determined to have a child. She has kidney failure several months after childbirth, and her mother donates a kidney. The kidney is rejected and Shelby dies. The name of this movie is so appropriate. The women seem to be delicate like a magnolia, but are actually as strong as steel. Pretty...

Words: 911 - Pages: 4

Free Essay

Idgaf

...the others in the herd. But to my kind, well, it almost ended my life one day, although, that same day I’ve never loved my family so much. That day, I was guarding our ally way like Papa Johnny tells me to, while the herd is out grabbing food. Then, the Junk Yard Cats came. Papa and Mama always told me about them and how they were the only pack they’ve seen around that was my kind, but they didn’t want me to ever be one of them. They had this kind of label on themselves. Well, Junk Yard Cats pretty much explains where they come from. Papa Johnny told me a few stories about them; like how they would do stupid stunts on railroad tracks, or jump off high places like bridges. Papa also told me they weren’t that intelligent. Mama Nita told me how they would walk around thinking that they owned the place. I always told them I’d be strong enough to take them on, but I was wrong that day. “Here kitty kitty kitty kitty!” said Bobby, one of the members. “He ain’t no cat Bobby; he’s a pretty boy now. With his precious bunny ears that his hoppin’ mama gave him!” said Sean, the leader. “Where’s your jumpin’ family? Doing all the hard work while they leave the weak link at home?” “You guys can go...

Words: 801 - Pages: 4

Free Essay

Argumentative

...Jeanine Ingalls Professor Linda Gross-O’ Neil English 099 3 December 2014 Beauty Pageants By wearing costumes, pretty shoes, and caking your face with makeup, a beauty pageant seems like a lot of fun for young girls. Dressing up like a Disney princess, winning an extravagant tiara, or lots of cash sounds perfect, right? Wrong. These girls are learning from a young age things that they shouldn't be taught. They are all dolled up in clothes and makeup and hair products that their parents spend thousands of dollars on that could be put towards important things, such as their children’s' futures. They are not developing any sort of personality or education; just what is taught through these competitions. Most importantly, they are learning to be comfortable with becoming a completely new girl that hides her sense of realness with fake eyelashes, and a pound of makeup. Beauty pageants are a way to exploit young women, and are killing the mockingbird within these children.      The first American beauty pageant took place in 1854. It was quickly shut down by public protest. Another American pageant didn't come along for thirty more years, when one was held in Rehoboth Beach, Delaware. This time it was not shut down to protests due to the strict rules and regulations. The women also wore modest clothing. Beauty pageants continued to grow in popularity, but the 1920s was when the idea of pageants completely changed. The 20's were a time of economic growth, and social...

Words: 932 - Pages: 4

Free Essay

Cryptography

...Prologue: Cryptography is an excellent art/science of protecting data from unwanted intruders by transforming the data to an unreadable format which can be brought back to the original form only by those who are authenticated to do so. This system depends vastly on a principle of key usage and is the basic underlying principle of network security. A detailed technical discussion of cryptography ,particularly from a network’s stand point provides a compelling and an up to date examination of the political and the social issues that are now inextricably intertwined with cryptography. A complete discussion of cryptography itself requires a complete book and so we touch on only the essential aspects of cryptography. It is now high time to introduce Alice and Bob who are essentially the widely accepted persons for a discussion on networks as communicators. Also ,the third party Trudy ,the intruder also has a wide role to play in hacking the discussion of the two. So the whole thread would hang about these three and the ways there adhere to secure and hack the data that is transmitted. A First look on Terminologies Now its high time to know the basic terminologies of Cryptography. Firstly the text that we type in the human understandable format is called as the Plain Text. The plain text is then converted to a generally incomprehensive form called as the Cipher text using a technique called Encryption which usually does this, and the cipher is transmitted. Precisely...

Words: 1831 - Pages: 8

Premium Essay

Electronic Voting System

...Applying MESE processes to Improve Online E-Voting Prototype System with Paillier Threshold Cryptosystem Web Services Version 1.00 A project submitted to the Faculty of Graduate School, University of Colorado at Colorado Springs in Partial Fulfillment of the Requirements for the Degree of Master of Engineering in Software Engineering Department of Computer Science Prepared by Hakan Evecek CS701 Dr. Chow Spring 2007 This project for the Masters of Engineering in Software Engineer degree by Hakan Evecek has been approved for the Department of Computer Science By _______________________________________________________ Dr. C. Edward Chow, Chair _______________________________________________________ Dr. Richard Weiner _______________________________________________________ Dr. Xiaobo Zhou Date Table of Contents Online E-Voting System Project Documentation 4 Abstract 6 1. Introduction 7 2. E-Voting System Related Literature 9 2.1. Public Key Cryptography 9 2.2. Homomorphic Encryption 10 2.3. Zero Knowledge Proofs 10 2.4. Threshold Cryptography 10 2.5. Cryptographic Voting Protocol 11 2.6. Issues in secure e-voting system 12 2.7. Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) 13 2.8. Chinese Remainder Theorem (CRT) 14 3. Online E-Voting System Project Description 17 3.1. Paillier Threshold...

Words: 7163 - Pages: 29

Free Essay

Client and Server Security

...Table of Contents Project Outline 3 Security Requirements 4 Perimeter Security 5 Client and Server Security 10 Database Security 10 Server Security 12 Wireless and Remote Access Security 15 Security Configuration Management 19 References 23   Project Outline Tiger Tees is a medium sized business with 4 locations across the eastern United States. This company produces and sells t-shirts for school systems, both locally and across the country via the internet. The organization’s headquarters is located in Beckley, West Virginia, and employs 25 people. The departments include the warehouse, human resources, accounting, sales, and administration. The second location of Tiger Tees is located in Columbus, Georgia, and employs 10 people full time, and 4 persons part time. The third location is located in Washington, DC, and employs 15 people. The fourth location located in Richmond, Virginia is the smallest of all the locations employing 5 persons full time. Tiger Tees is a fast growing company in dire need of a secure network that will ensure that the confidentiality, integrity, and availability of client information remain confidential. All transactions completed are sent to the organizational headquarters in Beckley, WV and processed there. In the past these orders and transactions have been completed by telephone and e-mail. A secure wide area network would streamline this process making the transactions more secure, and providing faster service to the customers...

Words: 5336 - Pages: 22

Premium Essay

Encryption in Today's Information Systems

...In today’s world of instant connectivity and information at users’ fingertips, it’s vital that sensitive information is safeguarded against those who seek to do personal harm and profit from gaining access to the data. The key behind keeping information safe is the method in which it’s protected and encrypted. In order to appreciate how information is secured, users must understand the encryption concepts behind it. To do this, one must comprehend the current encryption standards, the trends and developments in encryption technology, the importance of securing data, the government’s regulations pertaining to encryption, the companies involved in research and implementation, the implications of leaked or stolen data, and a brief look into the recent Heartbleed vulnerability. Encryption is at the heart of security in today’s networked world. When using the Internet, users are not always clicking around and taking in information passively, such as reading through their Facebook feed, a blog, or a news article. Often times, they are transmitting their own information while shopping online or registering for a website such as Twitter (Tyson 2014). Users take for granted the “behind the scenes” process of safeguarding the information they share while performing these day to day tasks. Simply put, encryption refers to any process used to make data more secure and less likely to be viewed or read by unauthorized or unintended parties (Tom’s Guide 2014). Encryption relies on...

Words: 767 - Pages: 4

Free Essay

Encryption and Its Uses in Communication

...Encryption is a very important aspect of our daily lives. Everywhere we go and everything we do now involves some sort of encryption technology. From turning on our cars to using a card access to gain entry to our workplace, encryption is there. More specifically, encryption in communication is a vital component to everyday life. Without encryption, our lives would be much different and unsecure. According to Oded Goldreich (2004), There are 2 main types of encryption: One is called Symmetric-key and the other is public-key encryption (pp 375-376). The Symmetric-key algorithm uses the same cipher for both encryption and decryption. Conversely, the public-key algorithm requires 2 separate keys. One of these keys encrypts the text or message and the other decrypts it. A big drawback to using the Symmetric-key system is that both parties must possess the single, shared key (Mullen & Mummert, 2007). The public-key system kept both parties having separate keys that neither even knew about, but could still decipher the message. Encryption is defined as the activity of converting data or information into code. There are a lot of different ways that we use encryption. Cell phones, web browsers, wireless access, and computer passwords are all different types of communication encryption. Encryption is definitely not a new technology. It has been used by militaries and governments to communicate secretly for years. Cell phones are a prime example of the encryption we use today. In fact...

Words: 1437 - Pages: 6

Premium Essay

Cryptography

...Symmetric Cryptography Secret writings have been found in many civilizations dating back to thousands of years where wide spread writings were adopted. Some of these civilizations included the Egyptians with their use of hieroglyphics, the Greeks and Spartan and the use of Scytale, and the Romans with the use of the Caesar Cipher. All these encryption methods could be thought of as symmetric encryption, which uses the same key to encrypt and decrypt the ciphertext. With a more contemporary look at symmetric key encryption with computer data, we can classify it into two categories called block ciphers and stream ciphers. The data in a block cipher would be broken down into specific sizes, for example 64-bit blocks or 128-bit blocks, which then the blocks would be encrypted separately. In stream ciphers, data would be encrypted in a stream of bits as oppose to dividing the data into blocks of bits. The decryption process for these two classification of symmetric encryption, of course, would be to use the same encryption key. Differences and Similarities with Symmetric and Asymmetric The fundamental difference between symmetric and asymmetric cryptography would be that asymmetric uses two keys, a public and private key, for encryption and decryption. If a private key is used to encrypt, then a related public key would be used to decrypt. This could also work the other way around when a public key is used to encrypt, then a related private key would be used to decrypt. Unlike...

Words: 558 - Pages: 3

Premium Essay

Ethical Hacking Lab 2

...Lab #2 – Assessment Worksheet Applying Encryption and Hashing Algorithms for Secure Communications Ethical Hacking Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you applied common cryptographic techniques to ensure confidentiality, integrity, and authentication. You created an MD5sum and SHA1 hash on a simple text file on a Linux virtual machine and compared the hash values of the original files with those generated after the file had been modified. Next, you used GnuPG to generate an encryption key pair and encrypted a message. Finally, you used the key pairs to send secure messages between two user accounts on the virtual machine and verified the integrity of the received files. Lab Assessment Questions & Answers 1. Compare the hash values calculated for Example.txt that you documented during this lab. Explain in your own words why the hash values will change when the data is modified. The harsh value would change because of course there is a change in data of the file "Example.txt" so if the file should be transfer from the source to the destination with different hash string, for example the source hash string is 3ddhyhhhs47878, and when it reach the destination the...

Words: 662 - Pages: 3