Preferred Language
Articles
/
BRcoPo8BVTCNdQwCamXJ
IMPROVED STRUCTURE OF DATA ENCRYPTION STANDARD ALGORITHM
...Show More Authors

The Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key generations. This means the key generation system generates two keys: one is simple, and the other one is encrypted by using an improved Caesar algorithm. The encryption algorithm in the first 8 round uses simple key 1, and from round 9 to round 16, the algorithm uses encrypted key 2. Using the improved structure of the Data Encryption Standard algorithm, the results of this paper increase Data Encryption Standard encryption security, performance, and complexity of search compared with standard Data Encryption Standard. This means the Differential cryptanalysis cannot be performed on the cipher-text.

Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Aip Conference Proceedings
Developing a lightweight cryptographic algorithm based on DNA computing
...Show More Authors

This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of

... Show More
Crossref (7)
Crossref
Publication Date
Thu Dec 20 2007
Journal Name
Journal Of Planner And Development
Globalization and the identity of the mental image structure of urban spaces
...Show More Authors

This research discusses the subject of identity in the urban environment as it attempts to answer a number of questions that come with the concept of identity. The first of these questions: What is identity? Can a definition or conceptual framework be developed for identity? What about individual, collective, cultural, ethnic, political and regional identity? Is there a definition of identity in the urban environment in particular? If there is a definition of identity, what about social mobility responsible for social change? How can we see identity through this kinetics? Can we assume that identity in the urban environment has a variable structure or is of variable shape with a more stable structure? Can we determine the spatial-tempora

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 11 2022
Journal Name
Journal Of Petroleum Research And Studies
The Structural and Stress Analysis of Hemrin North Structure, North of Iraq.
...Show More Authors

  The study focused on the results of first paleostress from thrust fault slip data on Tertiary age of Hemrin North Structure, North of Iraq. The stress inversion was performed for fault slip data using an improved right dihedral model, and then followed by rotational optimization (Georient Software). The trend of the principal stress axes (σ1, σ2 and σ3) and the ratio of the principal stress differences (R) show the main paleostress field is NE-SW compression regime. As well as using Lisle graph and Mohr diagram to determine the magnitudes of palestress.  The values paleostress of the study area were σ1=1430 bars, σ2=632 bars and σ3=166 bar. The large magnitudes of the primary stress axes could be attributed to active tecto

... Show More
View Publication
Crossref
Publication Date
Sat Jun 25 2022
Journal Name
International Journal Of Drug Delivery Technology
Study of Histological Structure of Mesencephalon in White Cheeked Bulbul (Pycnonotus leucotis)
...Show More Authors

The histological structure of Pycnonotus leucotis was investigated to fill the dearth of information on the histology of mid-brain from available literature and help understand its brain. The brain is wide and short and its length 1.5 cm, and it consists of three regions. The middle region is the mesencephalon. The mesencephalon was divided into optic tectum and tegmentum. The optic tectum consists of six main layers, while the tegmentum contains nuclei of cranial nerves.

View Publication
Scopus Crossref
Publication Date
Wed May 12 2021
Journal Name
Annals Of The Romanian Society For Cell Biology
Determining Grades and Standard Levels for the Most Important Physical and Motor Abilities of Sepak Takraw Juniors in Iraq
...Show More Authors

(Sepak takraw) is a game that mixes football and volleyball, it is played on a court similar to a badminton court, in which players have the right to play the ball with any part of the body except the arm and hand. The object of the game is to return the ball to the opponent's court and score a point. Since it is a newly emerging game, all aspects related to it must be studied and covered in order to reach the highest levels, and it is known that each game or sporting activity has its own physical and motor capabilities, which is important to determine the level of technical performance, as the game's abilities contribute to mastering the skills. The importance of research in determining standard levels of physical and motor abilities for y

... Show More
View Publication Preview PDF
Publication Date
Mon Aug 21 2023
Journal Name
Sport Tk-revista Euroamericana De Ciencias Del Deporte
Determining the grades and standard levels of some mental skills as an indicator for the selection of young volleyball players
...Show More Authors

ABSTRACT Purpose: The determination of standard scores and levels for some mental skills by researchers is of great importance, especially if it matches the target research sample, Method: as the researchers used the descriptive approach in the survey method, and the researchers chose the sample of youth players for clubs for the season (2022-2021), numbering (127) players, and the researchers identified the scale and procedures and applied it to the research sample, Results: obtained the results that were processed, extracted grades and standard levels, and then interpreted them and obtained conclusions, Conclusion: the most important of which are: The standard levels of mental skills reached the results of the sample studied within the

... Show More
View Publication
Publication Date
Wed May 01 2019
Journal Name
Journal Of Global Pharma Technology
Application of H-Point Standard Addition Method in Kinetic- Spectrophotometric Determination of Phenylephrine in Nasal Drops and Tetracycline in Capsule
...Show More Authors

A new simultaneous spectrophotometric-kinetic method was developed to determine phenylephrine (PHEN) and tetracycline (TETR) via H-point standard addition method (HPSAM). The proposed procedures rely on the measurements of the difference in the rate of charge-transfer (CT) reaction between each of PHEN and TETR as electron donors with p-Bromanil (p-Br) as an electron acceptor. Different experimental factors which affect the extent of the complex formation were investigated by monitoring the value of absorbance at 446 nm. Time pair of 50 -100 sec was selected and employed, among different examined pairs since it results in the highest accuracy for HPSAM-plot. Linear calibration graphs in the concentration ranges of 10.0-40.0 and 10.0–50.0

... Show More