The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key is decreased about 66%. On the other hand, the distance is decreased less than 1% when the multiplier is larger than 66. Therefore, to avoid attacking by using the proposed method, the multiplier which is larger than 66 should be chosen. Furthermore, it is shown that if the public key equals 3, the multiplier always equals 2.
The behavior and shear strength of full-scale (T-section) reinforced concrete deep beams, designed according to the strut-and-tie approach of ACI Code-19 specifications, with various large web openings were investigated in this paper. A total of 7 deep beam specimens with identical shear span-to-depth ratios have been tested under mid-span concentrated load applied monotonically until beam failure. The main variables studied were the effects of width and depth of the web openings on deep beam performance. Experimental data results were calibrated with the strut-and-tie approach, adopted by ACI 318-19 code for the design of deep beams. The provided strut-and-tie design model in ACI 318-19 code provision was assessed and found to be u
... Show MoreThe freedom to promote ideas is one of the freedoms protected by constitutions and laws, and it is exercised by individuals through traditional and electronic media. However, this freedom must be exercised according to certain limits, represented by the necessity of respecting human rights, just as individuals have the freedom to exercise their right to publish and express their opinion in every way. Frankly, in return, she must respect the rights of others . Perhaps the development that has occurred in the various media, including journalism, radio, television, and the emergence of a new medium represented by the Internet, has contributed significantly to harming the security of individuals through the promotion of extremist ideas. This be
... Show More|
This research addressed the cultural factors that are affecting the communicator in international public relations in light of the theory of the cultural relativism. The research aimed to find out the nature of cultural differences between societies and how can for professionals in international public relations understanding the culture of other and communicate with him peacefully. The researcher used qualitative and interpretative methodology. Some of the important results of the research are: The Communities are affected by cultural factors that are composed from values, customs, traditions, prevailing and inherited ethic, languages, religious beliefs, fashion, gender, colors indi |
In this paper , an efficient new procedure is proposed to modify third –order iterative method obtained by Rostom and Fuad [Saeed. R. K. and Khthr. F.W. New third –order iterative method for solving nonlinear equations. J. Appl. Sci .7(2011): 916-921] , using three steps based on Newton equation , finite difference method and linear interpolation. Analysis of convergence is given to show the efficiency and the performance of the new method for solving nonlinear equations. The efficiency of the new method is demonstrated by numerical examples.
Abstract
In this paper, fatigue damage accumulation were studied using many methods i.e.Corton-Dalon (CD),Corton-Dalon-Marsh(CDM), new non-linear model and experimental method. The prediction of fatigue lifetimes based on the two classical methods, Corton-Dalon (CD)andCorton-Dalon-Marsh (CDM), are uneconomic and non-conservative respectively. However satisfactory predictions were obtained by applying the proposed non-linear model (present model) for medium carbon steel compared with experimental work. Many shortcomings of the two classical methods are related to their inability to take into account the surface treatment effect as shot peening. It is clear that the new model shows that a much better and cons
... Show MoreNew Fourteen compounds were synthesized in four steps. The first step included synthesis of 2-biphenyl fused ring of imidazo(1,2- a)pyrimidine from the reaction of 2-aminopyrimidine and biphenyl phenacyl bromide . The second step was introduced aldehyde group from the reaction of 2-biphenyl fused rings of imidazo(1,2-a)pyrimidine with POCl3 in presence of DMF and CHCl3. 3-Carbaladehyde derivatives of fused imidazo/pyrimidine was reacted with different aromatic amines to afford new Schiff bases. These new 3- imines derivatives was reduced by using sodiumborohydride to yield another new 3-aminomethyl-2-biphenyl imidazo (1,2-a)pyrimidine derivatives in moderate yield .Some new prepared compounds were identified by melting point, FT- IR , 13C-
... Show More