Sunday, January 26, 2020

Blowfish Algorithm Advantages and Disadvantages

Blowfish Algorithm Advantages and Disadvantages Blowfish is a keyed (piece of information that determines the functional output of a cryptographic algorithm or cipher), symmetric cryptographic block cipher. It was designed by Bruce Schneier in 1993. Since then it has been analyzed considerably, and it is slowly gaining acceptance as a strong encryption algorithm. Blowfish is license-free and is available free for all uses. It is also a symmetric block cipher that can be used as a drop-in replacement for DES or IDEA. It takes a variable-length key, from 32 bits to 448 bits, making it ideal for both domestic and exportable use. Blowfish is also one of the fastest block ciphers in public use, making it ideal for a product that functions on a wide variety of processors found in mobile phones as well as in notebook and desktop computers. The first implementation of the Blowfish Algorithm in LabVIEW. With this set of subvis one can encrypt data in LabVIEW without the need of external software. This can be used to send data securely over Data socket as well as TCP and UDP communications along with protect remote control systems from unauthorized access, by encrypting the control communications. .( B. Schneier, Applied Cryptography, John Wiley Sons, New York, 1994.) 3.2 Strategies and Mechanisms Blowfish has a 64-bit block size and a key length of somewhere from 32 bits to 448 bits. The algorithm consists of two parts. One is a key-expansion part and one more is a data- encryption part. Key expansion converts a key of at most 448 bits into several subkey arrays totaling 4168 bytes. It is a 16-round Feistel cipher and uses large key-dependent S-boxes (basic component of symmetric key algorithms which performs substitution). Each round consists of a keydependent permutation, and a keydependent substitution. It is also similar in structure to CAST-128, which uses fixed S-boxes. Blowfish is suitable for application where the key does not change frequently, like a communication link or an automatic file encryptor. It is significantly faster than most encryption algorithm when on 32-bit microprocessor with large data caches. (Fast Software Encryption, Cambridge Security Workshop Proceedings December 1993) 3.3 The Feistel structure of Blowfish A Fiestel network is a general method of transforming any function (generally called F- function) into a permutation. It was inented by Horst Fiestel and has been used in many block chiper designed. The diagram below shows the action of Blowfish. Each line represents 32 bits. The algorithm keeps two subkey arrays: the 18-entry P-array and four 256-entry S-boxes. The S-boxes accept 8-bit input and produce 32-bit output. One entry of the P-array is used every round, and after the final round, each half of the data block is XORed with one of the two remaining unused P-entries. The diagram to the right shows Blowfishs F-function. The function splits the 32-bit input into four eight-bit quarters, and uses the quarters as input to the S-boxes. The outputs are added modulo 232 and XORed to produce the final 32-bit output. Since Blowfish is a Feistel network, it can be inverted simply by XO7Ring P17 and P18 to the cipher text block, then using the P-entries in reverse order. Blowfishs algorithm initialize with the P-array and S-boxes. The secret key is then XORed with the P-entries in order and then use the same method to encrypt all the zero string. The consequential ciphertext replaces P1 and P2 then encrypt the new P1 and P2 with the modified subkeys. Now the output is P3 and P4. Altogether Blowfish algorithm will repeat 521 times in order to calculate new subkeys for the P-array and the four S-boxes. It is about 4KB data is processed. The blowfish uses a large number of subkeys. These keys must be precomputed before any data encryption or decryption. The P-array consists of 18 32-bit subkeys: P1, P2, P3, P18. There are four 32-bit S-boxes with 256 entries each: S1,0, S1,1,, S1,255; S2,0, S2,1,..,, S2,255; S3,0, S3,1,, S3,255; S4,0, S4,1,..,, S4,255. Figure 3: Feistel Network (John Wiley Sons, New York, 1994) As what mentioned above, blowfish has 16 rounds. The method of calculating it: The input is a 64-bit data element, x. Divide x into two 32-bit half: xL, xR. Then, for i = 1 to 16: xL = xL XOR Pi xR = F(xL) XOR xR Swap xL and xR After the sixteenth round, swap xL and xR again to undo the last swap. Then, xR = xR XOR P17 and xL = xL XOR P18. Finally, recombine xL and xR to get the ciphertext. 3.4 Key Expansion Key expansion converts a key of at most 448 bits into several subkey arrays totaling 4168 bytes. The figure and the explanation of the Key Explanation of Blowfish are showed below Explanation for the Key Explanation of Blowfish figure : Step 1: Expand key to 576-bit XOR with P array Store results of 2 in P array Step 2: datal = 0x00000000; datar = 0x00000000; for (i = 0; i Blowfish_encipher(datal, datar); bf_P[i] = datal; bf_P[i + 1] = datar; } for (i = 0; i for (j = 0; j Blowfish_encipher(datal, datar); bf_S[i][j] = datal; bf_S[i][j + 1] = datar; } } 3.5 Application That Use Blowfish Method Below are the applications that using Blowfish Encryption: AEdit : A free Windows word processor incorporating text encryption. Coolfish: An encrypting text editor for Windows. Foopchat: Encrypted chat and advanced file sharing using a client/server architecture. JFile by Land-J Technologies: A database program for the PalmOS platform. Freedom by Zero-Knowledge: Privacy for web browsing, e-mail, chat, telnet, and newsgroups. JFile is one of the famous application that use blowfish method. JFile5 is the new version of the JFile. It is a flat-file database application for the PalmOS. There are 4 primary views in JFile 5.0. First is Main View, where it is the view that shows a list of all the JFile 5 databases that are currently installed on the Palm device. Second is New/Modify Database Structure View, this is the view when we are creating a new database, or modifying the structure of an existing database. Here is where we have to set the field names, the field types, the database name, and other elements of the database structure. The third view is Database View, this is the view that presented along when we tap on a database name from the Main View. The last view is Record View, this is the view that received when we tap a specific record from the Database View. In this JFile5 we can change the current method of security for each database by tapping the lock icon of the database on the main screen. There are three levels of security for databases in JFile5. The first level is the green/open lock where at this level the database contains no security, any user accessing the device can view and edit the database. The second level is the orange/grey closed lock, at this level the database is protected by the Security applications password (if it is set). To access this database, we will need to provide the password set in the Security application. This security level is appropriate for handing the Palm temporarily to a colleague so they wont have easy access to the database, but the information is not encrypted in any way. The third level is the red/dark closed lock at this level we will choose an encryption password for the database. The entire database will be encrypted, and we MUST remember the password to access the database. Due to the encryption, certain operations within the database will be slower. In addition, we will need to insure that any PC/Mac side utilities that we use w ith JFile support the encryption method. There are also some new features in this JFile5 where the maximum number of databases increased to 120 and it is improved use of color in the application compared to JFile4. There are 5 different sorts and filter settings can be saved for quick and easy usage, it is also easier to use because of the updated user interface. It is also has multiple locked columns for left/right scrolling in the main database view and the encryption of databases using 64-bit Blowfish algorithm. The VFS memory cards made easy movement of databases and have new calculated value field types. There are also default values for fields, read-only field options are also available with the Beam-Via-Coola (www.coola.com) support. They also enhanced resolution for Handera 330 devices, extensive keyboard input support and the Navigation of most common areas of JFile for JogDial equipped devices. The limitations for this JFile5 are 120 databases (1 in the demonstration version), 20 character maximum for field names, 50 fields maximum per databases, 4,000 characters per field of data, 10,000 characters per record of data and 16,000 records per database. 3.6 Hardware Architecture Pipelining is a famous technique for improving the throughput of computers, by using parallel elements so that several instructions can be worked on simultaneously. The basic idea of pipelining is to begin carrying out a new instruction before execution of an old one is completed. When pipelining is used, the number of steps in the basic algorithm is less important than fitting the steps into a framework so that they can be performed in parallel. The figure of the pippelining implementation are showed below These are processed separately (with delayed arithmetic carries shown in the figure as carry) and then combined at the end of processing. Even though more clock cycles are needed, the speed of the clock can be greatly improved, because smaller adders are required at each stage, with smaller internal propagation delays. (Malaysian Journal of Computer Science, Vol. 14 No. 1, June 2001, pp. 16-27) These are some examples of blowfish hardware architecture Figure 18: Chip Specifications What is this table? Explanation needed Mode Specification 0 Idle 1 Initial 2 Encrypt 3 DecryptTable 1: Mode Specification What is this figure? Explanation needed The controller is implemented as a Finite State Machine and described in a behavioral Verilog model. The figure and the explanation of the Finite State Machine are showed below Figure 20: FSM of Controller (Bruce Schneier, Applied Cryptography, John Wiley Sons, Inc. 1996) Explanation of Finite State Machine figure : e1: Finish loading data from ROM to SRAM e2: Finish initialization and mode != 1 e3: Finish encryption and mode != 2 e4: Finish decryption and mode != 3 Datapath includes ROM modules, SRAM modules, and the main arithmetic units of Blowfish. The figure showed below is the architecture of the datapath Figure 21 : The architecture of the datapath Explanation for the figure of the architecture : The  Ã‚ ° string is mapped to ROM_P and ROM_S-box. The P-array is mapped to SRAM_P, and the four S-boxes are mapped to SRAM_Sbox. Because the size of SRAM module is 2n words, P1 and P18 are implemented as registers, and the others are mapped to 1632 bits SRAM. We use a shift register under DataIn to expand 4-bit input to 64-bit input and a shift register over DataOut to reduce 64-bit output to 4-bit output. CORE implements the loop of the 16-round iteration. A pipeline stage is added to the output of the SRAM modules. The pipeline stages will double the performance of the Blowfish hardware but lead to the overhead of area. 3.7 Advantages and Drawbacks Blowfish is one of the fastest block ciphers in general use, except when changing keys. Each new key requires pre-processing equivalent to encrypting about 4 kilobytes of text, which is very slow compared to other block ciphers. This prevents its use in certain applications, but is not a problem in others, such as SplashID. In an application, its actually a benefit especially the password-hashing method used in OpenBSD uses an algorithm derived from Blowfish that makes use of the slow key schedule. Blowfish is not subject to any patents and is therefore freely available for anyone to use. This has contributed to its popularity in cryptographic software. The disadvantages of Blowfish are it must get key to the person out of band specifically not through the unsecured transmission channel. Each pair of users needs a unique, so as number of users increase, key management becomes complicated. For example N(N-1)/2 keys required. Blowfish cant provide authentication and non-repudiation as two people have same key. It also has weakness in decryption process over other algorithms in terms of time consumption and serially in throughput

Saturday, January 18, 2020

Analysis Sometimes The Sky’s Too Bright

Thomas describes the thoughts and feelings of falling out of a broken relationship with metaphors like the profusion of images and things. The poem has also explored the perspectives of both parties in the failed relationship. It also uncovers the facades of the â€Å" over fruitful smiles† as it describes the genuine feelings underneath. â€Å" Sometimes the sky’s too bright† denotes that submission is the only thing left to do after a broken relationship. The metaphor of the sky and the wildlife of it describes the love the persona is in.â€Å" Sometimes the sky’s too bright,† shows how sometimes love can be too intense and too glaring as described by â€Å" bright†. Also, â€Å" or has too many clouds or birds† illustrates the obstructions in the sky, blocking the view where birds and clouds are the metaphors of the different obstacles and blurring a relationship can have. The persona is using these metaphors to paint a visual image of how a relationship is like the sky, unpredictable. When it’s clear, the future is vivid and distinct, however, clouds and bird may suddenly infest the view, blurring the road ahead of the relationship.The poem continues by â€Å" And far away’s too sharp a sun to nourish thinking of him. â€Å" In my opinion, this refers to how the persona thinks that the imminent future of her relationship is too clear for her to try and sculpt her future as described by â€Å" nourish† where it is used to describe the upbringing of the relationship she wants. As the first four lines proceeds together, the persona is trying to say that the relationship may sometimes be too precise and intense, it may also be too unclear and blurred, thus, she can not sculpt the perfect future of her love life, making her submit to reality.Through line 5 to line 15, the persona is expressing that she has no ability to change the way she still feels or to turn away from it, thus she makes t he selfish decision to wish her muse falls into the same depression the persona is in too. In line 9, ‘weightless’ is being used to describe the lips followed by the inability to ‘lift’ it in line 11. This intensifies the persona’s feeling of unworthy and defeat as she is not able to lift something that is weightless, which shows how useless the persona thinks of herself. In line 12, a juxtaposition ‘creature’ and ‘angel’ is being used to differentiate heart from mind.In my opinion, the persona tries to degrade her muse in attempt to get over him by calling him a creature who hurts her. She is able to change how she thinks of her muse however, she is unable to change how she sees him, evidently when ‘angel’ is used. Thus, the persona expresses her desire for her muse to also feel the way she does. When she isn’t able to ‘lift the weightless lips’ , she wishes him to also ‘go down in mis ery’. Line 16 narrates â€Å" No stopping. † This caesura shows determination in the persona to just submit to the facts. However, a hint of reluctance is observed as â€Å" No stopping. † instead of ‘stop. ’.The lengthening of the statement has a soft and submissive sound. Through this poem, the persona ventured from her personal feelings towards her muse, continued by accepting that she cannot change and thus hopes for her muse to fall in misery with her, and realizes eventually that the only thing one can do when falling out of love is to submit, which is the purpose of the poem. The tone of the poem is emotional and sentimental. The metaphors used are of nature, like the sky, clouds and birds. These visual imageries has a relaxing feeling, where there is no intense or dramatic emotion detected, making the poem very heartfelt and sincere.Also the diction of the poem showed no anger or strong feelings due to the lack of loaded words. The frequent use of metaphors indicated that the poem had many connotations showing the sentimental value of each metaphor. This gives the poem a very deep meaning that goes beyond the literal meaning of the words. Although the visual imager used does not show signs of dramatic emotion, the language use does. It is seen where â€Å" My horrid images for me† is used. ‘Horrid’ being used as an intensifier for ‘bad’ shows the discontent of the persona towards what lies before his eyes.It is filled with her distasteful emotions, proving that the poem is in fact emotional. Similarly, ‘ misery’, ‘burns’ and ‘tear’ are all loaded words used throughout the poem to intensify the adjectives used to describe the persona’s emotions. The use of such loaded words gives us an idea on the extent of the specific emotion. The language use in the poem is therefore emotional and impactful, yet not flamboyant. Finally, the lack of alliter ation and rhyming schemes suggests that the persona did not have smooth thoughts and emotions.Thus, the tone of the  poem is not uniform, but generally similar throughout. It is seen in line 7-15 that there is a hint of plead and sorrow in the persona’s tone, where she pleads for the hurt to be even. However, through line 16 to 19, the tones changed from sorrow and plead to determination and succumb, where she accepts reality and is focused on moving on. Henceforth, it can be seen that the poem is flooded with emotion and slightly differs as the poem progresses. There is a free structure to this poem where no fixed structure is being used to narrate the different emotions observed.However, there is still a progression as the poem continues form line to line, which gives the poem a narrated structure. The first 4 lines is used to describe how unpredictable a relationship can get. The next 4 lines is used to show how the persona has no ability to turn away from the hurt she f eels. Followed by the next 7 lines which is when the persona tries an alternative which is hoping her partner feels pain to make her feel better. Line 16-19 then clearly shows the persona’s decision to move on and her determination in that decision.Starting the next stanza is a change in perspective, from the female’s to the male’s where the first 5 lines shows the hurt he feels despite it being his actions, â€Å" I tear her breast†¦flowing from her, but mine. ’ The next 4 lines describes the persona’s inability to comprehend his own actions, followed by the last 2 line when he expresses that he does not ache although he feels pain which means that he cannot undo anything thus, no point aching. Henceforth, the free structure shows that relationships are not fixed, that they are always surprising.Also, the different number of lines used to describe each phase differs, as there is no telling how long each phase will last. Thus, although Ã¢â‚¬Ë œ Sometimes the sky’s too bright ‘ does not have a fixed stannic structure, it has a structure within its content to create an imagery of the different phases of emotions felt by the persona. In conclusion, the title ‘ Sometimes the sky’s too bright’ prepares the reader to expect a poem on the bad side of being too positive, which is congruent to the poem itself, where sometimes a relationship that is too precise and intense and lead the couple down a slippery slope.

Thursday, January 9, 2020

What Experts Are Saying About Topics about Science for Essay and What This Means For You

What Experts Are Saying About Topics about Science for Essay and What This Means For You The multiple topics could be found, for instance, in the dissertation abstracts international database. From time to time, students are provided to select a topic for their research paper independently, but in a few colleges, tutors prefer to assign tasks in specific regions of study related to exercise science. Science papers involve lots of research and data. Research papers are trying, but in addition they have the capacity to be somewhat rewarding. Topics about Science for Essay: No Longer a Mystery Remember a great science research topic and a superb research paper based on this ought to be identified for publication into a scientific journal. In the majority of instances, understanding the needs of science research topics will ask you to carry out some preliminary exploration around this issue. Despite how the thesis statement is at the start of the research paper, it's supposed t o be the culmination of all the research that was completed and analyzed as a member of the research undertaking. Without a suitable content, decent research paper topics won't make sense. You'll quickly discover that a tiny discussion can go quite a way. To choose which subject you're likely to discuss, it's crucial to see the complete collection of good persuasive speech topics from the specific area of study. When you receive a topic, the best method to comprehend and handle the topic is to produce the topic your own. If you decide on one of these topics, you'll unquestionably succeed to draw the interest of your audience only because they involve the latest discussion topics. Now you have a great idea of the way to hunt for college research paper topics, you're ready for some suggestions. 1 way to do this is by taking a look at science essay examples. The fantastic thing about science is there are so many topics you may write about regardless of which course you're taki ng. If you're undertaking political science, you are quite lucky because this program is extremely debatable nowadays. What About Topics about Science for Essay? What follows is an extensive collection of the most intriguing research topics to have you started. Following are various sorts of essay topics for students that are categorized in many sections so you can easily chose the topic depending on your need and requirement. Many students discover that they just have to talk through a couple of topic ideas until they make their final selections. If you should write only 1 paper at the conclusion of the period, you can breathe out as you are blessed. Another good idea is to receive some absolutely free essay examples of different kinds and on various subjects to find a general idea of the way in which a thriving debatable paper looks. When deciding on a physical science paper topic, you have to make certain that the topic you've chosen is current and strong, and that it's so mething which you can work with to make an intriguing paper. It's possible to find out more regarding students' term papers here. You will locate all the necessary info in their site, where you could also join a few of their mailing lists. If you still feel you need help, even if you've managed to decide on a topic, you may always seek the services of a custom writing service that will help you produce a fabulous research paper of which you'll be proud and will guarantee you a nice mark. When you get the prompt, attempt to correct the academic format with the support of numerous free online writing guides. This video guides you through the procedure for picking a topic. Make certain you understand which you're comparing. Make certain there are sources from which you are able to retrieve information on the subject of your selection. As you have observed, different kinds of essay topics have various tactics to approach them, and in addition, they have their own benefits. In reality, if you think about that themost expensive portion of your system will most likely be your records, it makes lots of sense to shell out money on a better turntable so that your records will stay in good form. Many distinctive regions of health science often interact to give health and medical services to patients. For the appropriate rise and maturation of the nation, it's very required to go science and technology hand in hand. It's the science and technology that has helped India to receive its real recognition all around the world. Science and technologies are playing great function in meeting the requirements and necessities of the contemporary folks. In case the latter is true, the topic should be chosen dependent on its depth and controversial nature. The option of compare and contrast essay topics isn't a simple task because you should clearly show your analytical skills. It's recommended that you just opt for the topic that it is possible to deal with, for instance, if you're not t sketching the personality characteristics then you ought to better not elect for it. These topics will help you a great deal in your assignments. Writing a superb persuasive essay is not a simple task, however, it's achievable. You might be asking yourself how to select and handle decent science essay topics. Select an intriguing essay topic, and you're going to begin enjoying it. There are several persuasive essay topics to pick from to finish your high school or college assignment. With over one million of species identified it is among the most fascinating subdivisions of biology. There is another science about viruses. The way the dark side of science is extremely destructive nowadays. Since our user isn't professional scientist, facing unknown squirrel species and not able to identify them could dampen their enthusiasm for a squirrel-liker. The structure is everything when it has to do with a science paper. Science research topics ought to have a purpose and the total purpose ought to be to add something scholastic to academia. Details of Topics about Science for Essay When prior brainstorming is finished, you might begin drafting your essay. At exactly the same time, it's a terrific persuasive essay idea. In the procedure for writing research articles, it's required to adhere to a particular topic. Understanding how to pick a topic is critical for all writing, and below is a concise guide explaining the best way to do it.

Wednesday, January 1, 2020

The Assassination Of President Abraham Lincoln Essay

One of the most tragic moments throughout all American history in my opinion is the Assassination of President Abraham Lincoln. With no surprise I am writing about certain event that occurred leading up to, during, and after this unfortunate event. This historical event is clouded with conspiracy but I will try to avoid specifics of that particular view. Abraham Lincoln was born in a little town located within Hardin Country, Kentucky on February 12, 1809 (www.whitehouse.gov/abrahamlincoln). He grew up dirt poor and in my opinion could be considered a frontiers man just like his father was. His mother on the other hand passed away when Lincoln was at a very young age. Lincoln was also in my opinion of great intelligence, hard worker, and a very ambitious young man. He would farm and run a store in New Salem, Illinois (www.whitehouse.gov). A little less known tale about him is that he was a very good wrestler back in the day and received his nick name â€Å"honest Abe† for walk ing a library book several miles to be returned. He met the love of his life May Todd after becoming a dynamic lawyer and had four young boys. Sadly only one lived to see adult hood (www.history.com). Abraham Lincoln became the 16th President of the United States of America in 1861. At this time the states where not so united. As a matter of fact 13 of them had succeeded from the union in the same year President Lincoln was elected (1861). The historical significance of this time was known as theShow MoreRelatedAbraham Lincoln s Assassination Of President1176 Words   |  5 PagesAbraham Lincoln’s Assassination President Abraham Lincoln was the first United States president ever to be assassinated while in office. He was president during the Civil War and had many people that did not like him. John Wilkes Booth was one of those people and was the man responsible for the Presidents death. The following is about Abraham Lincoln, John Wilkes Booth, Booth’s plan for Lincoln, the President’s assassination, Booth’s capture and how it affected history. Abraham Lincoln was bornRead MoreEssay on The Assassination of President Abraham Lincoln1007 Words   |  5 Pages Abraham Lincoln was the sixteenth president of the United States of America. Lincoln was born on February 12, 1809, and died on April 15, 1865. As a young child, Abraham lived in a log cabin in Illinois. Around the age of twelve he began working, wielding an ax, building fences, and cutting wood. Later, Abraham Lincoln married a woman named Mary Todd; together they had four children. Lincoln started his presidency on March 18, 1861, but his term was cut short on April 14, 1865, by the assassinRead MoreThe Events Leading Up to the Assassination of President Abraham Lincoln1288 Words   |  6 PagesThe events leading up to the Assassination of President Abraham Lincoln There are men who want to take my life. And I have no doubt they will do it. . . If it is to be done, it is impossible to prevent it. This quote can closely be related to Abraham Lincoln and his assassination. This shows that President Lincoln was committed to his beliefs and traditions. When Abraham Lincoln was assassinated, it was because his killer was an anti-abolitionist, and he did not agree with Lincoln’s ways. HeRead MoreThe Assassination Of Presidents Abraham Lincoln And John F Kennedy1225 Words   |  5 PagesMany treasonous acts have plagued American soil in the past, most notably, the assassinations of Presidents Abraham Lincoln and John F Kennedy. Tragic events such as a loss of a political figure, or leader, emphasize the dark and bloody motives that often stem from greed and lead to poor decision making skills. Oftentimes, similar incidents occur in both literature and Hollywood productions, from Shakespeare’s classic plays to James Bond films, with the antagonist always facing dire consequencesRead MoreJohn Wilkes Booth and Abraham Lincoln707 Words   |  3 PagesAbraham Lincoln was a great president. He helped the county become one, and so much more. Abraham Lincoln was possibly the best at what he did, until the assassination.( Abraham Lincoln Assassination). Abraham Lincoln, a beloved and hated president of the United States, was assassinated. Before Abraham Lincoln was assassinated the things he did were great. He ended the civil war, was planning to build more since the damage of the civil war. He did away with slavery which was a big deal. Abraham LincolnRead MoreAn American Legend Lost715 Words   |  3 Pages From presidency, to a traumatic death, Abraham Lincoln lived a fascinating life. The sixteenth American president helped in the preservation of American freedoms, bringing an end to slavery. From The Emancipation Proclamation to the development of the secret service, Abraham Lincoln set an example for the future leadership of America. As the Civil War began in April 1861, a detective named Allan Pinkerton gave assistance to Abraham Lincoln. The president requested his presence immediately to WashingtonRead MoreAbraham Lincoln s Legacy Of The Man Behind The Gun With A Plan982 Words   |  4 PagesMichael Dominguez Mrs. Gaither English III -5 4 March 2016 Abraham Lincoln Assassination Early morning of April 15, 1865 the United States of America stood still. It started as a normal day at the theatre, but soon a dramatic turn would change United States history forever. This paper will define President Abraham Lincoln’s life, the man behind the gun with a plan, and how the United States reacted. Abraham Lincoln was the 16th President of the United States of America, he served a single term fromRead MoreKilling Lincoln by Bill OReilly962 Words   |  4 PagesKilling Lincoln Book Review The mystery of how John Wilkes Booth pulled off the most influential and notorious assassinations in history is revealed in Killing Lincoln. The author of this book, Bill O’Reilly, built up the plot of the story through vivid historical details and pieced them together like a thriller. He tries to explain all of what happened on one of the most interesting and sad days in American history. Many conspiracies and Civil War ideals are on full display in the book. I agreeRead MoreThe Assassination of President Lincoln Essay1276 Words   |  6 PagesThe Assassination of President Lincoln The assassination of President Lincoln was so tragic because both Abraham Lincoln and John Wilkes Booth both believed they were doing the right thing. Abraham Lincoln wanted freedom for all because he believed that was right. He knew not everyone agreed and that was why America was having a Civil War but he felt that it was the right thing to do. John Wilkes Booth believed that there should be slaves in the south and did not agree with President Lincoln atRead MoreEssay on Abraham Lincoln - the Greatest President1069 Words   |  5 PagesAbraham Lincoln There have been forty four U.S. presidents over the past two hundred and twenty years. What president has served the best for our country? None other than Abraham Lincoln. Abraham Lincoln is the greatest president ever because he did great things such as ending slavery, getting the us through the Civil War, and helped our country a lot. The American Civil War was a war between the Southern states and the Confederate states. Abraham Lincoln was not very prepared for the war militarily