The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime numbers and the possibility of using integer numbers. While the second branch of the proposal is the multi-key encryption algorithm. The current algorithm provides the ability to use more than two keys. Keys can be any kind of integer number (at least the last key is a prime number), not necessarily to be of the same length. The Encryption process is based on converting the text characters to suggested integer numbers, and these numbers are converted to other numbers by using a multilevel mathematical model many times (a multilevel process depending on the number of keys used), while the decryption process is a one-level process using just one key as the main key, while the other keys used as secondary keys. The messages are encoded before encryption (coded by ASCII or any suggested system). The algorithm can use an unlimited number of keys with a very large size (more than 7500 bytes), at least one of them a prime number. Exponentiation is also used for keys to increase complexity. The experiments proved the robustness of the key exchange protocol and the encryption algorithm in addition to the security. Comparing the suggested method with other methods ensures that the suggested method is more secure and flexible and easy to implement.
The reaction of some new Schiff bases ( 2-[(2-Amino – ethylimino)-methyl]-R , 2-({2-[(R-benzylidene)-amino]-ethylimino}-methyl)-R with Benzoyl chloride or Acetyl chloride were carried out. Subsequent reactions of these products N-(2-Amino-ethyl)-N-[Chloro-(R) –methyl]-benzamide or N-(2-{?-[chloro-(R) –methyl]-amino}-ethyl)-N-[chloro-(R) –methyl]- benzamide with thiourea afforded thioureas compounds. The synthesized compounds were confirmed by their IR,UV,spectra and C.H.N. analysis.
The research tagged: the new aesthetic in contemporary world painting. The research contained five chapters. The first chapter dealt with the research problem and its importance. It dealt with the concept of the new aesthetic as a concept concerned with the topics of the mind, i.e. the most comprehensive and diverse topics. The New Aesthetic is an aesthetic and stylistic structure whose taste, aesthetic, artistic and emotional contribute to its structure with awareness of the context. The aim of the research is to identify the new aesthetic in contemporary world painting. As for the objective limits of the research, the researcher was interested in studying the new aesthetic, especially in abstract expressionism, pop art, opera, and conc
... Show MoreIn contrast to the classical antibacterial sulfa drugs that are unsubstituted or monosubstituted, our newly synthesized analogs were designed to obtain sulfonamide moiety containing disubstituted hetero nitrogen atom. These compounds were formed successfully by chlorosulfonation of acetanilide and the product was treated with different cyclic amines and finally amide hydrolysis was necessary to get agents that were analyzed for IR, UV, CHN, melting points and solubility. At last, we studied their antibacterial activity on certain types of bacteria and we noticed the inactivity due to possible steric factor. Principly, this means these products have no inhibiting action against the used microbes.
The aim of this paper is to propose an efficient three steps iterative method for finding the zeros of the nonlinear equation f(x)=0 . Starting with a suitably chosen , the method generates a sequence of iterates converging to the root. The convergence analysis is proved to establish its five order of convergence. Several examples are given to illustrate the efficiency of the proposed new method and its comparison with other methods.
This paper presents a combination of enhancement techniques for fingerprint images affected by different type of noise. These techniques were applied to improve image quality and come up with an acceptable image contrast. The proposed method included five different enhancement techniques: Normalization, Histogram Equalization, Binarization, Skeletonization and Fusion. The Normalization process standardized the pixel intensity which facilitated the processing of subsequent image enhancement stages. Subsequently, the Histogram Equalization technique increased the contrast of the images. Furthermore, the Binarization and Skeletonization techniques were implemented to differentiate between the ridge and valley structures and to obtain one
... Show MoreIn the present paper we report the synthesis of a new ligand [HL][(2-1-[(2-hydroxy-benzylidene)-hydrazono]-ethyl) benzene-1, 3, 5-triol and its complexes with (Mn", Fe", Cd", and Hg") The ligand was prepared in two steps. In the first step a solution of salicylaldehyed in methanol reacted under reflux with hydrazinemonohydrate to give an intermediate compound which reacted in the second step with 2, 4, 6-trihydroxidernonohydrate giving the tientioned ligand. The complexes were synthesis by direct reaction of the corresponding metal chloride with ligand. The ligand and the complexes have been characterized by spectroscopic methods [" H NMR, IR, UV-Vis,, atomic absorption], HPLC microanalysis along with conductivity measurements. From the abo
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreThe present work involved synthesis of new thiozolidinone derivatives,These derivatives could be divided into three type of compounds; quinolin-2-one[V]a,b ,Schiff bases[VI]a,b and imide compounds[VII]a-d. The reaction p-Hydroxyacetophenone with thiosemicarbazide led to formation thiosemicarbazon compound [II], the reacted of thiosemicarbazone with chloro acetic acid in CH3CO2Na led to yield 4- thiazelidinone compound[III] in addition, thiosemicarbazide was POCl3 to [III] give [IV] compound used intermediates to synthesis new compounds of reacted with two type of coumarin in glacial acetic acid to give quinolin-2-one[V]a,b, The later compound refluxing with different benzaldehyde in dry benzene and glacial acetic acid give Schiff bases[VI]a
... Show More