Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
100% found this document useful (3 votes)
1K views35 pages

Instant download Cryptography Algorithms, A guide to algorithms in blockchain, quantum cryptography, zero-knowledge protocols, and homomorphic encryption 1st Edition Massimo Bertaccini pdf all chapter

encryption

Uploaded by

ybemayarle
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
Download as pdf or txt
100% found this document useful (3 votes)
1K views35 pages

Instant download Cryptography Algorithms, A guide to algorithms in blockchain, quantum cryptography, zero-knowledge protocols, and homomorphic encryption 1st Edition Massimo Bertaccini pdf all chapter

encryption

Uploaded by

ybemayarle
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 35

Get ebook downloads in full at ebookmeta.

com

Cryptography Algorithms, A guide to algorithms in


blockchain, quantum cryptography, zero-knowledge
protocols, and homomorphic encryption 1st Edition
Massimo Bertaccini
https://ebookmeta.com/product/cryptography-algorithms-a-
guide-to-algorithms-in-blockchain-quantum-cryptography-zero-
knowledge-protocols-and-homomorphic-encryption-1st-edition-
massimo-bertaccini/

OR CLICK BUTTON

DOWNLOAD NOW

Explore and download more ebook at https://ebookmeta.com


Recommended digital products (PDF, EPUB, MOBI) that
you can download immediately if you are interested.

Cryptography Algorithms - 2nd Edition (Early Release)


Massimo Bertaccini

https://ebookmeta.com/product/cryptography-algorithms-2nd-edition-
early-release-massimo-bertaccini/

ebookmeta.com

Cambridge IGCSE and O Level History Workbook 2C - Depth


Study: the United States, 1919-41 2nd Edition Benjamin
Harrison
https://ebookmeta.com/product/cambridge-igcse-and-o-level-history-
workbook-2c-depth-study-the-united-states-1919-41-2nd-edition-
benjamin-harrison/
ebookmeta.com

Applied Cryptography Protocols Algorithms and Source Code


in C 2nd Edition Bruce Schneier

https://ebookmeta.com/product/applied-cryptography-protocols-
algorithms-and-source-code-in-c-2nd-edition-bruce-schneier/

ebookmeta.com

Getting Started with Angular: Create and Deploy Angular


Applications 1st Edition Victor Hugo Garcia

https://ebookmeta.com/product/getting-started-with-angular-create-and-
deploy-angular-applications-1st-edition-victor-hugo-garcia/

ebookmeta.com
Raptors in Captivity guidelines for care management Arent

https://ebookmeta.com/product/raptors-in-captivity-guidelines-for-
care-management-arent/

ebookmeta.com

The Poco Field An American Story of Place 1st Edition


Talmage A. Stanley

https://ebookmeta.com/product/the-poco-field-an-american-story-of-
place-1st-edition-talmage-a-stanley/

ebookmeta.com

Chemical Peels in Clinical Practice A Practical Guide to


Superficial Medium and Deep Peels Series in Cosmetic and
Laser Therapy 1st Edition Xavier G Goodarzian
https://ebookmeta.com/product/chemical-peels-in-clinical-practice-a-
practical-guide-to-superficial-medium-and-deep-peels-series-in-
cosmetic-and-laser-therapy-1st-edition-xavier-g-goodarzian/
ebookmeta.com

Objects of Desire 1st Edition C J Emerson

https://ebookmeta.com/product/objects-of-desire-1st-edition-c-j-
emerson/

ebookmeta.com

Game Changer Seattle Steelheads Football Game On in


Seattle 7 1st Edition Jami Davenport

https://ebookmeta.com/product/game-changer-seattle-steelheads-
football-game-on-in-seattle-7-1st-edition-jami-davenport/

ebookmeta.com
Theatre Fiction in Britain from Henry James to Doris
Lessing Writing in the Wings 1st Edition Graham Wolfe

https://ebookmeta.com/product/theatre-fiction-in-britain-from-henry-
james-to-doris-lessing-writing-in-the-wings-1st-edition-graham-wolfe/

ebookmeta.com
Cryptography
Algorithms

A guide to algorithms in blockchain, quantum


cryptography, zero-knowledge protocols, and
homomorphic encryption

Massimo Bertaccini

BIRMINGHAM—MUMBAI
Cryptography Algorithms
Copyright © 2022 Packt Publishing

All rights reserved. No part of this book may be reproduced, stored in a retrieval system,
or transmitted in any form or by any means, without the prior written permission of the publisher,
except in the case of brief quotations embedded in critical articles or reviews.
Every effort has been made in the preparation of this book to ensure the accuracy of the
information presented. However, the information contained in this book is sold without warranty,
either express or implied. Neither the author, nor Packt Publishing or its dealers and distributors,
will be held liable for any damages caused or alleged to have been caused directly or indirectly
by this book.
Packt Publishing has endeavored to provide trademark information about all of the companies
and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing
cannot guarantee the accuracy of this information.

Group Product Manager: Vijin Boricha


Publishing Product Manager: Yogesh Deokar
Senior Editor: Arun Nadar
Content Development Editor: Sayali Pingale
Technical Editor: Nithik Cheruvakodan
Copy Editor: Safis Editing
Project Manager: Vaidehi Sawant
Proofreader: Safis Editing
Indexer: Vinayak Purushotham
Production Designer: Prashant Ghare
Marketing Co-Ordinator: Nimisha Dua

First published: January 2022


Production reference: 1190122

Published by Packt Publishing Ltd.


Livery Place
35 Livery Street
Birmingham
B3 2PB, UK.

978-1-78961-713-9
www.packt.com
To my mom, Nadia, and my dad, Domenico, for their sacrifices
and giving me the opportunity to learn and grow.
To my "soulmate" Elaine for her support.
– Massimo Bertaccini
Contributors
About the author
Massimo Bertaccini is a researcher and principal scientist, CEO, and co-founder
of Cryptolab Inc.
His career started as a professor of mathematics and statistics. Then, he founded
Cryptolab, a start-up in the field of cryptography solutions for cybersecurity. With his
team of engineers, he projected and implemented the first search engine in the world that
is able to work with encrypted data.
He has obtained several international prizes and awards, including the Silicon Valley
inventors award and the Seal of Excellence from the EU.
Currently, he teaches mathematical models at EMUNI University as a contract
professor and has published many articles in the field of cryptography, cybersecurity,
and blockchain.

– At the outset, I would like to thank Yogesh Deokar (product manager)


who approached me at the start and has supported me throughout the
entire writing process. I would also like to extend my gratitude towards
Vaidehi Sawant (project manager) and Arun Nadar (editor) for their
dedication and constant support that helped me write this book smoothly
from start to finish. I'd like to thank Sayali Pingale for her contribution to
this book. Also, thanks to the technical reviewer, Brian Wu, for his help in
validating the technical aspects. Finally, I would like to thank Alessandro
Passerini, Tiziana Landi, Terenzio Carapanzano, Yi Jing Gu, Paul Hager
for their constant support, and especially Gerardo Iovane, who has shared
some of the most brilliant mathematical ideas with me.
About the reviewer
Xun (Brian) Wu is a senior blockchain architect and consultant. He has written eight
books on popular fields within blockchain, such as Hyperledger and Ethereum (from
beginning to advanced), published by O'Reilly and Packt. Brian has 18+ years of hands-on
experience across various technologies, including blockchain, big data, the cloud, systems,
and infrastructure UI. He has worked on more than 50 projects in his career.
Table of Contents

Preface

Section 1: A Brief History and Outline


of Cryptography
1
Deep Diving into Cryptography
An introduction to cryptography  4 Rosetta Stone 14
Binary numbers, ASCII code, and Caesar cipher 15
notations7 ROT1318
Fermat's Last Theorem, prime The Beale cipher 19
numbers, and modular mathematics  9 The Vernam cipher 26

A brief history and a panoramic Notes on security and


overview of cryptographic computation29
algorithms14 Summary32

Section 2: Classical Cryptography


(Symmetric and Asymmetric Encryption)
2
Introduction to Symmetric Encryption
Notations and operations in Triple DES  61
Boolean logic  38 DESX62
DES algorithms 44
Simple DES 44
DES50
viii Table of Contents

AES Rijndael 63 Summary74


Description of AES 64
Attacks and vulnerabilities in AES 68

3
Asymmetric Encryption
Introduction to asymmetric RSA  86
encryption76 Explaining RSA  88
The pioneers 77 Analyzing RSA 89
Conventional attacks on the algorithm 90
The Diffie-Hellman algorithm 78
The application of RSA to verify
The discrete logarithm 80 international treaties 92
Explaining the D-H algorithm 82 Unconventional attacks 94
Analyzing the algorithm 83
Possible attacks and cryptanalysis on PGP97
the D-H algorithm 84 The ElGamal algorithm 98
Summary101

4
Introducing Hash Functions and Digital Signatures
A basic explanation of hash Authentication and digital
functions104 signatures  120
Overview of the main hash RSA digital signatures 122
algorithms107 Digital signatures with the
Logic and notations to implement ElGamal algorithm 127
hash functions 109 Blind signatures 130
Explanation of the SHA-1 algorithm 113
Summary134
Notes and example on SHA-1 117
Table of Contents ix

Section 3: New Cryptography Algorithms


and Protocols
5
Introduction to Zero-Knowledge Protocols
The main scenario of a ZKP – Zk-SNARKs in Zcash cryptocurrency  157
the digital cave 139 One-round ZKP  163
Non-interactive ZKPs  140 ZK13 – a ZKP for authentication and
Schnorr's interactive ZKP  146 key exchange 167
An introduction to zk-SNARKs – spooky
Summary173
moon math 151

6
New Algorithms in Public/Private Key Cryptography
The genesis of the MB09 A direct signature method in MBXI 207
algorithm  177 The appendix signature method
Introducing the MB09 with MBXI 209
algorithm181 A mathematical demonstration of the
MBXI digital signature algorithm 210
An explanation of MB09  184
The evolution of MB09
Introducing the MBXI algorithm191
and MBXI – an introduction
A numerical example of MBXI 194 to MBXX  213
Unconventional attacks on RSA 197 An explanation of the MBXX protocol 217

Digital signatures on MBXI 205 Summary223

7
Elliptic Curves
An overview of elliptic curves 226 Implementing the D-H
Operations on elliptic curves 226 algorithm on elliptic curves  235
Scalar multiplication 232
x Table of Contents

Elliptic curve secp256k1 – the Attacks on EDCSA and the


Bitcoin digital signature 240 security of elliptic curves  249
Step one – generating keys  242 Step one – discovering the random
Step two – performing the digital key, [k] 250
signature in secp256k1 243 Step two – recovering the private
Step three – verifying the key, [d] 251
digital signature 244
Considerations about the
A numerical exercise on future of ECC 253
a digital signature on Summary253
secp256k1244

8
Quantum Cryptography
Introduction to Q-Mechanics Analysis attack and technical
and Q-Cryptography 256 issues  273
An imaginary experiment to Quantum computing 277
understand the elements of Shor's algorithm  280
Q-Mechanics 258 Step 1 – Initializing the qubits 281
Step 1 – Superposition 258 Step 2 – Choosing the random
Step 2 – The indetermination process 261 number, a 282
Step 3 – Spin and entanglement 262 Step 3 – Quantum measurement 284
Step 4 – Finding the right candidate, (r) 285
Q-Cryptography 265
Quantum key distribution – Quantum Fourier Transform 286
BB84268 Step 5 – Factorizing (n) 290
Step 1 – Initializing the quantum Notes on Shor's algorithm  290
channel270
Step 2 – Transmitting the photons  270 Post-Q-Cryptography  291
Step 3 – Determining the shared key 271 Summary292
Table of Contents xi

Section 4: Homomorphic Encryption and the


Crypto Search Engine
9
Crypto Search Engine
Introduction to CSE – Hash and Boolean logic 315
homomorphism298 CSE explained 316
Partial homomorphism in RSA 301 The innovation in CSE 318
Analysis of homomorphic Computational analysis on CSE  321
encryption and its implications 304 Example of computational
Math and logic behind search engines  306 brute-force cracking 324

Introduction to trees – graph Applications of CSE 326


theory  310 Summary328
Huffman code 312
Index
Other Books You May Enjoy
Preface
In this age of extremely high connectivity, cloud computing, ransomware, and hackers,
digital assets are changing the way we live our lives, so cryptography and cybersecurity
are crucial.
The changes in processing and storing data has required adequate evolution in
cryptographic algorithms to advance in the eternal battle against information piracy.
This book is a good tool for students and professionals who want to focus on the next
generation of cryptography algorithms.
Starting from the basics of symmetric and asymmetric algorithms, the book describes all
the modern techniques of authentication, transmission, and searching on encrypted data
to shelter from spies and hackers. You'll encounter Evolute algorithms with zero
knowledge, consensus on the blockchain, elliptic curves, quantum cryptography, and
homomorphic search.
The book even gives some focus to attacks and cryptoanalysis of the main algorithms
adopted in computer science. The main purpose of this book is to train you to deeply
understand this complex topic. Indeed, particular attention has been paid to present
examples and suggestions are given to help you better understand the concepts.

Who this book is for


This hands-on cryptography book is for students, IT professionals, cybersecurity
enthusiasts, or anyone who wants to develop their skills in modern cryptography and
build a successful cybersecurity career. Working knowledge of beginner-level algebra and
finite fields theory is required.
xiv Preface

What this book covers


Chapter 1, Deep Diving into Cryptography Landscape, gives an introduction to
cryptography, what it is needed for, and why it is so important in IT. This chapter also
provides a panoramic view of the principal algorithms in the history of cryptography.
Chapter 2, Introduction to Symmetric Encryption, analyzes symmetric encryption.
We will focus on algorithms such as DES, AES and Boolean Logic, which are widely used
to implement cybersystems. Finally, we will showcase attacks to these algorithms.
Chapter 3, Asymmetric Encryption, analyzes the classical asymmetric encryption
algorithms, such as RSA and Diffie–Hellman, and the main algorithms in private/public
key encryption.
Chapter 4, Introducing Hash Functions and Digital Signatures, focuses on hash functions
such as SHA-1 and looks at digital signatures, which are one of the pillars of modern
cryptography. We will look at the most important and famous signatures and blind
signatures (a particular case of anonymous signatures).
Chapter 5, Introduction to Zero-Knowledge Protocols, looks at zero-knowledge protocols,
which are one of the new fundamental encryption protocols for the new economy of
the blockchain. They are very useful for authenticating humans and machines without
exposing any sensitive data in an unsafe channel of communication. New protocols, such
as zk-SNARK, used in the blockchain are based on these algorithms. Finally, we will
present Z/K13, a new protocol in zero knowledge, invented by the author.
Chapter 6, New Algorithms in Public/Private Key Cryptography, presents three algorithms
invented by the author. MB09 is based on Fermat's Last Theorem. MB11 could be an
alternative to RSA. Digital signatures related to these algorithms are also presented.
Moreover we will present MBXX, a new protocol, invented by the author used
for consensus.
Chapter 7, Elliptic Curves, looks at elliptic curves, which are the new frontier for
decentralized finance. Satoshi Nakamoto adopted a particular kind of elliptic curve to
implement the transmission of digital currency in Bitcoins called SECP256K1. Let's see
how it works and what the main characteristics of this very robust encryption are.
Chapter 8, Quantum Cryptography, looks at how, with the advent of quantum computing,
most of the algorithms we have explored until now will be under serious threat of
brute-force attacks. One possible solution is Quantum Cryptography (Q-Cryptography).
It is one of the most exhilarating and fantastic kinds of encryption that the human mind
has invented. Q-Cryptography is only at the beginning but will be widely adopted in
a short time.
Other documents randomly have
different content
Barlow felt a nervous shock that was almost electrical. He stiffened
spasmodically. He suddenly felt a hundred times stronger than he
had been, and felt a stinging contempt for the sheep around him.
Rage welled into his mind like a hot acid burning away all but the
desire to fight and kill.
As through a red haze he saw Valnar collapse limply to the ground.
But the other prisoners were standing rigidly, faces twisted with hate.
He leaped forward.
"Come on, you yellow-bellied cowards! What the hell does it matter if
they have all the guns? Maybe we can get a couple of them
anyway!"
A hoarse roar of approval came from the throats of those behind
him. Laurine was at his side and they were running toward the group
of rulers. And behind came the others of the Organization, a blood-
hungry, hateful rabble. Unfearful of death and desiring only to tear
the flesh of the Director's men from their bodies.
Then a volley from the massed guards struck into them. Barlow felt
something strike him on the side. He staggered and almost fell as a
burning thread of agony lanced through his body. But the rage
upheld him, made him fight on.
Others passed him. Laurine ran ahead. He fell to the ground, then
fought his way to his hands and knees and crawled toward Dodson
and his subordinates. He saw Laurine leap at the men at the
projector. They went to the ground, fighting and kicking in utter
disregard of all rules.
The bullets of the guards were dropping men and women all around
him. Many struggled up to fight their way onward, but many stayed
down.
Barlow reached the projector, grasped the tripod to lift himself up. He
saw dimly that Dodson and his officers were clamoring at the gate to
be freed from the bloody courtyard, but the portals had been closed
to retain the prisoners and now did as well for the Director.
Weakly, Barlow turned the projector around. He had to lean over it to
stay up, but he threw its beam over those at the gate. They went
down like dead men, slow and easily. Then the guards, then....
The rage was leaving him. Blackness was closing in around his
mind. He sagged over the projector, and dragged it to the ground
with him.

The blackness around his mind first parted to allow a tiny pricking of
pain to dart into his mind. Then, as though the neural dams had
broken, agony came. He twisted to escape it, and from far away a
voice spoke soothingly.
The agony faded slowly and he became conscious of light. He saw a
white-garbed figure near him. The face was pretty and feminine, and
in the woman's hand was a hypodermic syringe. His mind cleared
slowly and he saw more clearly. He was in a hospital.
He turned and saw Laurine and Valnar standing at the other side of
the bed. Laurine's hand was bandaged and her face scratched but
otherwise she seemed uninjured. She smiled at him.
"That was close," said Valnar and Barlow looked at him. The strange
man had entirely recovered his good humor and confidence. Barlow
saw that he was again wearing the plaque.
"Did we all go crazy?" Barlow asked.
"Just a bit more than usual," Valnar grinned. "I got to thinking about
what you told me about the Unamenables, and came to the
conclusion that the Mental Ray only controlled the average person.
Those who varied from the norm, either above or below, were
affected differently. To them it was an irritant. Haven't you ever
thought it odd that all the Unamenables fought Dodson?
"So when we were captured because the warden reported our visit, I
agreed to help Dodson. He had scientists, anyway. They sure
blanked the projector that night. Dodson wanted me to make the
projector deadly. I did, then Dodson was quite amused when I
suggested that he try it out on you Unamenables. But instead of
killing you, it aroused you to intense activity. The only thing that went
wrong was that Dodson crossed me, and the ray was too strong for
me to compensate. I was laid out cold."
"We've won, Joel," Laurine interrupted. "Dodson is dead. And we've
released all the members from the prisons, and destroyed the
transmitters."
"Yeah," agreed Valnar. "My job here is done, so I'll be getting along. I
want to kill Dodson again, this time personally."
Barlow forced Laurine to sit on the edge of the bed. Then held her
hand to make sure that she stayed there, and faced Valnar.
"Why don't you stay here?" he asked.
Valnar shook his head. "I got to see about getting home," he said,
starting to go. "So long."
"Wait!" called Barlow. "Where are you going this time?" he asked
when Valnar halted. "All the way back to the beginning?"
"I've already been there," said Valnar. "That was my first trip. I had a
car then, but the elemental chaos ruined it and I was barely able to
get away in time."
A sudden thought struck Barlow. He grinned at Valnar.
Valnar frowned and demanded, "Well?"
"Remember your simile of time to a growing tree with a lot of
branches?"
Valnar nodded and waited.
"And remember how you said that you were creating new branches
every time you stopped?"
"Uh-huh," Valnar grunted impatiently.
"Well, I'll bet you haven't been sliding up and down the branches of
that tree at all. You've been leaping from one to another like a
monkey. And you weren't in your own past before you started, so you
can't be now. You aren't in your own time at all. When you leaped
back to elemental chaos, you planted this tree. You're climbing
around the wrong tree, fella."
Valnar started, then stared. "I guess I'll stay here for a while after all,"
he muttered as he turned and went out.
Laurine was watching Barlow. "You were trying to sell him something
then," she accused.
"Sure," he admitted easily. "Think of the world-limb we can build if he
stays with us." He laughed and drew her face down to his.
*** END OF THE PROJECT GUTENBERG EBOOK OUT OF
NOWHERE ***

Updated editions will replace the previous one—the old editions will
be renamed.

Creating the works from print editions not protected by U.S.


copyright law means that no one owns a United States copyright in
these works, so the Foundation (and you!) can copy and distribute it
in the United States without permission and without paying copyright
royalties. Special rules, set forth in the General Terms of Use part of
this license, apply to copying and distributing Project Gutenberg™
electronic works to protect the PROJECT GUTENBERG™ concept
and trademark. Project Gutenberg is a registered trademark, and
may not be used if you charge for an eBook, except by following the
terms of the trademark license, including paying royalties for use of
the Project Gutenberg trademark. If you do not charge anything for
copies of this eBook, complying with the trademark license is very
easy. You may use this eBook for nearly any purpose such as
creation of derivative works, reports, performances and research.
Project Gutenberg eBooks may be modified and printed and given
away—you may do practically ANYTHING in the United States with
eBooks not protected by U.S. copyright law. Redistribution is subject
to the trademark license, especially commercial redistribution.

START: FULL LICENSE


THE FULL PROJECT GUTENBERG LICENSE
PLEASE READ THIS BEFORE YOU DISTRIBUTE OR USE THIS WORK

To protect the Project Gutenberg™ mission of promoting the free


distribution of electronic works, by using or distributing this work (or
any other work associated in any way with the phrase “Project
Gutenberg”), you agree to comply with all the terms of the Full
Project Gutenberg™ License available with this file or online at
www.gutenberg.org/license.

Section 1. General Terms of Use and


Redistributing Project Gutenberg™
electronic works
1.A. By reading or using any part of this Project Gutenberg™
electronic work, you indicate that you have read, understand, agree
to and accept all the terms of this license and intellectual property
(trademark/copyright) agreement. If you do not agree to abide by all
the terms of this agreement, you must cease using and return or
destroy all copies of Project Gutenberg™ electronic works in your
possession. If you paid a fee for obtaining a copy of or access to a
Project Gutenberg™ electronic work and you do not agree to be
bound by the terms of this agreement, you may obtain a refund from
the person or entity to whom you paid the fee as set forth in
paragraph 1.E.8.

1.B. “Project Gutenberg” is a registered trademark. It may only be


used on or associated in any way with an electronic work by people
who agree to be bound by the terms of this agreement. There are a
few things that you can do with most Project Gutenberg™ electronic
works even without complying with the full terms of this agreement.
See paragraph 1.C below. There are a lot of things you can do with
Project Gutenberg™ electronic works if you follow the terms of this
agreement and help preserve free future access to Project
Gutenberg™ electronic works. See paragraph 1.E below.
1.C. The Project Gutenberg Literary Archive Foundation (“the
Foundation” or PGLAF), owns a compilation copyright in the
collection of Project Gutenberg™ electronic works. Nearly all the
individual works in the collection are in the public domain in the
United States. If an individual work is unprotected by copyright law in
the United States and you are located in the United States, we do
not claim a right to prevent you from copying, distributing,
performing, displaying or creating derivative works based on the
work as long as all references to Project Gutenberg are removed. Of
course, we hope that you will support the Project Gutenberg™
mission of promoting free access to electronic works by freely
sharing Project Gutenberg™ works in compliance with the terms of
this agreement for keeping the Project Gutenberg™ name
associated with the work. You can easily comply with the terms of
this agreement by keeping this work in the same format with its
attached full Project Gutenberg™ License when you share it without
charge with others.

1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside the
United States, check the laws of your country in addition to the terms
of this agreement before downloading, copying, displaying,
performing, distributing or creating derivative works based on this
work or any other Project Gutenberg™ work. The Foundation makes
no representations concerning the copyright status of any work in
any country other than the United States.

1.E. Unless you have removed all references to Project Gutenberg:

1.E.1. The following sentence, with active links to, or other


immediate access to, the full Project Gutenberg™ License must
appear prominently whenever any copy of a Project Gutenberg™
work (any work on which the phrase “Project Gutenberg” appears, or
with which the phrase “Project Gutenberg” is associated) is
accessed, displayed, performed, viewed, copied or distributed:
This eBook is for the use of anyone anywhere in the United
States and most other parts of the world at no cost and with
almost no restrictions whatsoever. You may copy it, give it away
or re-use it under the terms of the Project Gutenberg License
included with this eBook or online at www.gutenberg.org. If you
are not located in the United States, you will have to check the
laws of the country where you are located before using this
eBook.

1.E.2. If an individual Project Gutenberg™ electronic work is derived


from texts not protected by U.S. copyright law (does not contain a
notice indicating that it is posted with permission of the copyright
holder), the work can be copied and distributed to anyone in the
United States without paying any fees or charges. If you are
redistributing or providing access to a work with the phrase “Project
Gutenberg” associated with or appearing on the work, you must
comply either with the requirements of paragraphs 1.E.1 through
1.E.7 or obtain permission for the use of the work and the Project
Gutenberg™ trademark as set forth in paragraphs 1.E.8 or 1.E.9.

1.E.3. If an individual Project Gutenberg™ electronic work is posted


with the permission of the copyright holder, your use and distribution
must comply with both paragraphs 1.E.1 through 1.E.7 and any
additional terms imposed by the copyright holder. Additional terms
will be linked to the Project Gutenberg™ License for all works posted
with the permission of the copyright holder found at the beginning of
this work.

1.E.4. Do not unlink or detach or remove the full Project


Gutenberg™ License terms from this work, or any files containing a
part of this work or any other work associated with Project
Gutenberg™.

1.E.5. Do not copy, display, perform, distribute or redistribute this


electronic work, or any part of this electronic work, without
prominently displaying the sentence set forth in paragraph 1.E.1 with
active links or immediate access to the full terms of the Project
Gutenberg™ License.
1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if you
provide access to or distribute copies of a Project Gutenberg™ work
in a format other than “Plain Vanilla ASCII” or other format used in
the official version posted on the official Project Gutenberg™ website
(www.gutenberg.org), you must, at no additional cost, fee or expense
to the user, provide a copy, a means of exporting a copy, or a means
of obtaining a copy upon request, of the work in its original “Plain
Vanilla ASCII” or other form. Any alternate format must include the
full Project Gutenberg™ License as specified in paragraph 1.E.1.

1.E.7. Do not charge a fee for access to, viewing, displaying,


performing, copying or distributing any Project Gutenberg™ works
unless you comply with paragraph 1.E.8 or 1.E.9.

1.E.8. You may charge a reasonable fee for copies of or providing


access to or distributing Project Gutenberg™ electronic works
provided that:

• You pay a royalty fee of 20% of the gross profits you derive from
the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”

• You provide a full refund of any money paid by a user who


notifies you in writing (or by e-mail) within 30 days of receipt that
s/he does not agree to the terms of the full Project Gutenberg™
License. You must require such a user to return or destroy all
copies of the works possessed in a physical medium and
discontinue all use of and all access to other copies of Project
Gutenberg™ works.

• You provide, in accordance with paragraph 1.F.3, a full refund of


any money paid for a work or a replacement copy, if a defect in
the electronic work is discovered and reported to you within 90
days of receipt of the work.

• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.

1.E.9. If you wish to charge a fee or distribute a Project Gutenberg™


electronic work or group of works on different terms than are set
forth in this agreement, you must obtain permission in writing from
the Project Gutenberg Literary Archive Foundation, the manager of
the Project Gutenberg™ trademark. Contact the Foundation as set
forth in Section 3 below.

1.F.

1.F.1. Project Gutenberg volunteers and employees expend


considerable effort to identify, do copyright research on, transcribe
and proofread works not protected by U.S. copyright law in creating
the Project Gutenberg™ collection. Despite these efforts, Project
Gutenberg™ electronic works, and the medium on which they may
be stored, may contain “Defects,” such as, but not limited to,
incomplete, inaccurate or corrupt data, transcription errors, a
copyright or other intellectual property infringement, a defective or
damaged disk or other medium, a computer virus, or computer
codes that damage or cannot be read by your equipment.

1.F.2. LIMITED WARRANTY, DISCLAIMER OF DAMAGES - Except


for the “Right of Replacement or Refund” described in paragraph
1.F.3, the Project Gutenberg Literary Archive Foundation, the owner
of the Project Gutenberg™ trademark, and any other party
distributing a Project Gutenberg™ electronic work under this
agreement, disclaim all liability to you for damages, costs and
expenses, including legal fees. YOU AGREE THAT YOU HAVE NO
REMEDIES FOR NEGLIGENCE, STRICT LIABILITY, BREACH OF
WARRANTY OR BREACH OF CONTRACT EXCEPT THOSE
PROVIDED IN PARAGRAPH 1.F.3. YOU AGREE THAT THE
FOUNDATION, THE TRADEMARK OWNER, AND ANY
DISTRIBUTOR UNDER THIS AGREEMENT WILL NOT BE LIABLE
TO YOU FOR ACTUAL, DIRECT, INDIRECT, CONSEQUENTIAL,
PUNITIVE OR INCIDENTAL DAMAGES EVEN IF YOU GIVE
NOTICE OF THE POSSIBILITY OF SUCH DAMAGE.

1.F.3. LIMITED RIGHT OF REPLACEMENT OR REFUND - If you


discover a defect in this electronic work within 90 days of receiving it,
you can receive a refund of the money (if any) you paid for it by
sending a written explanation to the person you received the work
from. If you received the work on a physical medium, you must
return the medium with your written explanation. The person or entity
that provided you with the defective work may elect to provide a
replacement copy in lieu of a refund. If you received the work
electronically, the person or entity providing it to you may choose to
give you a second opportunity to receive the work electronically in
lieu of a refund. If the second copy is also defective, you may
demand a refund in writing without further opportunities to fix the
problem.

1.F.4. Except for the limited right of replacement or refund set forth in
paragraph 1.F.3, this work is provided to you ‘AS-IS’, WITH NO
OTHER WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR ANY PURPOSE.

1.F.5. Some states do not allow disclaimers of certain implied


warranties or the exclusion or limitation of certain types of damages.
If any disclaimer or limitation set forth in this agreement violates the
law of the state applicable to this agreement, the agreement shall be
interpreted to make the maximum disclaimer or limitation permitted
by the applicable state law. The invalidity or unenforceability of any
provision of this agreement shall not void the remaining provisions.
1.F.6. INDEMNITY - You agree to indemnify and hold the
Foundation, the trademark owner, any agent or employee of the
Foundation, anyone providing copies of Project Gutenberg™
electronic works in accordance with this agreement, and any
volunteers associated with the production, promotion and distribution
of Project Gutenberg™ electronic works, harmless from all liability,
costs and expenses, including legal fees, that arise directly or
indirectly from any of the following which you do or cause to occur:
(a) distribution of this or any Project Gutenberg™ work, (b)
alteration, modification, or additions or deletions to any Project
Gutenberg™ work, and (c) any Defect you cause.

Section 2. Information about the Mission of


Project Gutenberg™
Project Gutenberg™ is synonymous with the free distribution of
electronic works in formats readable by the widest variety of
computers including obsolete, old, middle-aged and new computers.
It exists because of the efforts of hundreds of volunteers and
donations from people in all walks of life.

Volunteers and financial support to provide volunteers with the


assistance they need are critical to reaching Project Gutenberg™’s
goals and ensuring that the Project Gutenberg™ collection will
remain freely available for generations to come. In 2001, the Project
Gutenberg Literary Archive Foundation was created to provide a
secure and permanent future for Project Gutenberg™ and future
generations. To learn more about the Project Gutenberg Literary
Archive Foundation and how your efforts and donations can help,
see Sections 3 and 4 and the Foundation information page at
www.gutenberg.org.

Section 3. Information about the Project


Gutenberg Literary Archive Foundation
The Project Gutenberg Literary Archive Foundation is a non-profit
501(c)(3) educational corporation organized under the laws of the
state of Mississippi and granted tax exempt status by the Internal
Revenue Service. The Foundation’s EIN or federal tax identification
number is 64-6221541. Contributions to the Project Gutenberg
Literary Archive Foundation are tax deductible to the full extent
permitted by U.S. federal laws and your state’s laws.

The Foundation’s business office is located at 809 North 1500 West,


Salt Lake City, UT 84116, (801) 596-1887. Email contact links and up
to date contact information can be found at the Foundation’s website
and official page at www.gutenberg.org/contact

Section 4. Information about Donations to


the Project Gutenberg Literary Archive
Foundation
Project Gutenberg™ depends upon and cannot survive without
widespread public support and donations to carry out its mission of
increasing the number of public domain and licensed works that can
be freely distributed in machine-readable form accessible by the
widest array of equipment including outdated equipment. Many small
donations ($1 to $5,000) are particularly important to maintaining tax
exempt status with the IRS.

The Foundation is committed to complying with the laws regulating


charities and charitable donations in all 50 states of the United
States. Compliance requirements are not uniform and it takes a
considerable effort, much paperwork and many fees to meet and
keep up with these requirements. We do not solicit donations in
locations where we have not received written confirmation of
compliance. To SEND DONATIONS or determine the status of
compliance for any particular state visit www.gutenberg.org/donate.

While we cannot and do not solicit contributions from states where


we have not met the solicitation requirements, we know of no
prohibition against accepting unsolicited donations from donors in
such states who approach us with offers to donate.

International donations are gratefully accepted, but we cannot make


any statements concerning tax treatment of donations received from
outside the United States. U.S. laws alone swamp our small staff.

Please check the Project Gutenberg web pages for current donation
methods and addresses. Donations are accepted in a number of
other ways including checks, online payments and credit card
donations. To donate, please visit: www.gutenberg.org/donate.

Section 5. General Information About Project


Gutenberg™ electronic works
Professor Michael S. Hart was the originator of the Project
Gutenberg™ concept of a library of electronic works that could be
freely shared with anyone. For forty years, he produced and
distributed Project Gutenberg™ eBooks with only a loose network of
volunteer support.

Project Gutenberg™ eBooks are often created from several printed


editions, all of which are confirmed as not protected by copyright in
the U.S. unless a copyright notice is included. Thus, we do not
necessarily keep eBooks in compliance with any particular paper
edition.

Most people start at our website which has the main PG search
facility: www.gutenberg.org.

This website includes information about Project Gutenberg™,


including how to make donations to the Project Gutenberg Literary
Archive Foundation, how to help produce our new eBooks, and how
to subscribe to our email newsletter to hear about new eBooks.

You might also like