The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key is decreased about 66%. On the other hand, the distance is decreased less than 1% when the multiplier is larger than 66. Therefore, to avoid attacking by using the proposed method, the multiplier which is larger than 66 should be chosen. Furthermore, it is shown that if the public key equals 3, the multiplier always equals 2.
The tax revenues achieved through projects of transition to private sector are regarded as an important source for using in achieving political, economic and social objectives. Since Iraq is heading towards free market economy, new strategies should be adopted to reform the taxation system from by a qualified taxation management office and to activate the taxation policy and to reconsider legislation in relation to the aware of the legible to the importance of disclosure of their taxable real income in order to arrive at contribution of privatization in the taxation revenues for the important role effect on economic activities. In the light of the above, the research is based upon a hypothesis which stipulates that privatization contribu
... Show MoreThis research is one of the public research aimed at identifying the communication habits and the implications of the content on the communication process, especially as the audience of specialized media is often characterized by effectiveness, depth and active in tracking the media message and interaction with its content. It means such audience is a positive, very active, dynamic, and very alert audience driven by his interests and psychological needs to watch specific programs meet his desires.
This satisfaction can only be achieved through the use of specialized media capable of producing programs that will communicate and interact between the ideas you present and this audience.
The phenomenon of specialized satellit
... Show MoreBasic Orientation and search path in determining the impact of creative thinking in cultural intelligence field research on the doctors competence, as is a theme of creative thinking great importance in spite of being a old , but his role at the individual level and / or organizational a sustainable effect toward developing a fact uncommon , any sense that one of the pillars of modernity and provide a unique future, as is the competitive weapon of the organizations in an environment dubbed fundamental change and provide all that is unfamiliar, and in the center of the field of research and objective measurement of creative thinking on doctors specialists at the construction of a state of the preference and
... Show MoreThe current research aims to recognize the exploratory and confirmatory factorial structure of the test-wiseness scale on a sample of Hama University students, using the descriptive method. Thus, the sample consists of (472) male and female students from the faculties of the University of Hama. Besides, Abu Hashem’s 50 item test-wiseness scale (2008) has been used. The validity and reliability of the items of the scale have also been verified, and six items have been deleted accordingly. The results of the exploratory factor analysis of the first degree have shown the presence of the following five acceptable factors: (exam preparation, test time management, question paper handling, answer sheet handling, and revision). Moreover,
... Show MoreCybercrime and risks to children between the problems and solutions( An analytical study in the light of international, Arab and national statistics).
Lies the problem of the study to identify a new type of crime is different from the same traditional character of the crimes or what was customary since human creation up to the information revolution and we enter the era of globalization, which is also called (cyber crime) and their negative impact on all segments of society, especially children, as they the day of the most important social security threats, for all local and international communities alike , and those risks require collective action to various sectors and segments of society ,especially the educated classes in order t
The research aims to demonstrate the impact of tax techniques on the quality of services provided to income taxpayers by studying the correlational and influencing relationships between the exploited variable (tax techniques) and the dependent variable (the quality of services provided to income taxpayers), and in line with the research objectives, the main hypothesis of the research was formulated (there is a relationship Significance between tax techniques and the quality of services provided to income taxpayers) a number of sub-hypotheses emerged from this hypothesis that were stated in the research methodology, and a number of conclusions were reached, the most important of which were (through the use of the correlation coeff
... Show MoreThis article deals with the approximate algorithm for two dimensional multi-space fractional bioheat equations (M-SFBHE). The application of the collection method will be expanding for presenting a numerical technique for solving M-SFBHE based on “shifted Jacobi-Gauss-Labatto polynomials” (SJ-GL-Ps) in the matrix form. The Caputo formula has been utilized to approximate the fractional derivative and to demonstrate its usefulness and accuracy, the proposed methodology was applied in two examples. The numerical results revealed that the used approach is very effective and gives high accuracy and good convergence.
The research aims to measure the impact of the quality of the audit on the Earnings Quality, for a sample of private joint stock companies listed on the Iraq Stock Exchange, as the research sample included (14) private and listed joint stock companies in issuing their financial statements for the period from (2010-2018), as well as companies The audit offices in charge of auditing these companies, which number (18) companies or an audit office, and the research relied on two main models for measurement, as the first model reflects the assumed relationship between independent variables represented in the characteristics of external audit quality and measuring the extent of its impact on the dependent variable represented in the Ea
... Show MoreThis study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show MoreIn this work a chemical sensor was built by using Plane Wave Expansion (PWE) modeling technique by filling the core of 1550 hollow core photonic crystal fiber with chloroform that has different concentrations after being diluted with distilled water. The minimum photonic bandgap width is.0003 and .0005 rad/sec with 19 and 7 cells respectively and a concentration of chloroform that filled these two fibers is 75%.