The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key is decreased about 66%. On the other hand, the distance is decreased less than 1% when the multiplier is larger than 66. Therefore, to avoid attacking by using the proposed method, the multiplier which is larger than 66 should be chosen. Furthermore, it is shown that if the public key equals 3, the multiplier always equals 2.
Ibuprofen is one of the most important members of NSAIDs, named aryl propionic acid derivative. Isatin (1H-indole-2,3-dione) is an important molecule of heterocyclic compounds that have many biological activities. This work illustrates the synthesis of new ibuprofen-isatin derivatives by connecting ibuprofen hydrazide with different isatin derivatives by a condensation reaction, followed by characterization by fourier-transform infrared spectroscopy (FTIR) and proton nuclear magnetic resonance (1H-NMR) spectroscopy. The anti-inflammatory activity was evaluated by using the egg-white induce edema method for all the synthesized compounds (5-8), the compounds 5 and 6 showed better anti-inflammatory activity than ibuprofen as a standard compoun
... Show MoreNew derivatives of the anti-inflammatory, leprostatic drug dapsone 4 are synthesized, characterized and biologically screened by the treating the drug dapsone with chloroacetyl chloride in the presence of base. Both amino groups are acylated to give compound 6. The symmetrical acylated product then treated with Phenol, N-Acetyl-p-aminophenol, p-Chlorophenol, m-Chlorophenol, o-Hydroxybezoic acid and m-Hydroxybezoic acid to give compounds 8(a-f). The antimicrobial activity was tested for the synthesized compounds; activates were good compared to the parent drug. All the new compounds have scanned for their biological activities toward gram ‒ve and gram +ve (M. tuberculosis, S. pneumoniae, E. coli and P. mirabilis) bacteria, the synthesized
... Show MoreIn this study the Sub family of Nomiinae Robertson,1904 (Hyminoptera: Halictidae) was revised There were five species registered in our investigation:
Many new heterocyclic compounds including 4-thiazolidinones containing indole with triazole units were described. The new Schiff bases [VII]a, b and [VIII]a,b synthesized by condensation acid hydrazides [II],[VI] with different (aromatic) aldehydes in absolute ethanol. The refluxing equimolar amounts of the Schiff bases ([VII]a,b, [VIII]a,b) with thioglycolic acid in benzene led to get thiazolidin-4-ones derivatives ([IX]a,b and [X]a-d). Finally, the new derivatives [XI]a-c run out via the reacted compound [IX]a with di
Nitrogen-comprising heterocyclic compounds and their derivatives have empirically been invaluable as therapeutic agents. Fundamentally, 4-chloro-6-nitro-2-amino-1,3-benzothiazole 1 was synthesized via bromination of 2-chloro-4-nitro aniline with ammonium thiocyanate. This new heterocyclic haloorganoamino-1,3-benzothiazole derivative, was a starting material, which condensed and tethered with three different aromatic aldehyde pendant arm in presence of ethanol and glacial acetic acid isolating an interesting sequence of tridentate Schiff bases 2-4. These compounds were used for complexation reactions in 1:1 (metal: ligand) stoichiometry to obtain heteroleptic Al(III), Ni (II) and K(I) benzothiazole chelat
... Show MoreThree of imide intermediate products were synthesized by reacting of phthalic anhydride with glycine (2a), and tetrachloro phthalic anhydride with glycine , (S)-2-[(tert-Butoxycarbonyl)amino]-3-aminopropionic acid ( 2b,c) respectively in dry toluene with azeotropic removal of water using Dean- stark apparatus then carboxyl functional group activated by refluxing with thionyl chloride, the resulted acid chloride (3a-c) were reacted with different amine (5-flourouracil, 4-chloroaniline, 4-bromoaniline, 2-amino thiazole, and pyrrolidine) (4a-e) , the resulted products consider as
... Show MoreThe research seeks to clarify the problems related to the aspects of the financial and accounting process resulting from entering into contractual arrangements with a period of more than 20 years, among which is the research problem represented by the lack of clarity of the foundations and procedures for the recognition of oil costs and additional costs borne by foreign invested companies, which led to a weakening of their credibility and reflection. Negatively "on the measurement and accounting disclosure of financial reports prepared by oil companies, and the research aims to lay down sound procedures for measuring and classifying oil costs and additional costs paid to foreign companies, and recognizing and recording them in th
... Show MoreCoumarins have been recognized as anticancer competitors. HDACis are one of the interesting issues in the field of antitumor research. In order to achieve an increased anticancer efficacy, a series of hybrid compounds bearing coumarin scaffolds have been designed and synthesized as novel HDACis, In this review we present a series of novel HDAC inhibitors comprising coumarin as a core e of cap group of HDAC inhibitors that have been designed, synthesized and assessed for their enzyme inhibitory activity as well as antiproliferative activity. Most of them exhibited potent HDAC inhibitory activity and significant cytotoxicity
This paper proposes a new password generation technique on the basis of mouse motion and a special case location recognized by the number of clicks to protect sensitive data for different companies. Two, three special locations click points for the users has been proposed to increase password complexity. Unlike other currently available random password generators, the path and number of clicks will be added by admin, and authorized users have to be training on it.
This method aims to increase combinations for the graphical password generation using mouse motion for a limited number of users. A mathematical model is developed to calculate the performance
