Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of security to Triple Data Encryption Standard algorithm using Nth Degree Truncated Polynomial Ring Unit algorithm. This aim achieved by adding two new key functions, the first one is Enckey(), and the second one is Deckey() for encryption and decryption key of Triple Data Encryption Standard to make this algorithm more stronger. The obtained results of this paper also have good resistance against brute-force attack which makes the system more effective by applying Nth Degree Truncated Polynomial Ring Unit algorithm to encrypt and decrypt key of Triple Data Encryption Standard. Also, these modifications enhance the degree of complexity, increase key search space, and make the ciphered message difficult to be cracked by the attacker.
The current phase distinguish by the rapid scientific development, which pushes individuals to have the necessities of scientific and practical life through the proper scientific thinking which contribute to the development of invention and creativity away from memorizing and indoctrination and encouraging individuals to looking for information and then attempting to process and develop these information instead of being a passive receiver. The investment of minds becomes the logical investment in all societies by preparing the citizen to become able to face life changes and its necessities. It is very important to take care of individuals and develop their mental abilities and thinking skills. The constructive strateg
... Show MorePolarization manipulation elements operating at visible wavelengths represent a critical component of quantum communication sub-systems, equivalent to their telecom wavelength counterparts. The method proposed involves rotating the optic axis of the polarized input light by an angle of 45 degree, thereby converting the fundamental transverse electric (TE0) mode to the fundamental transverse magnetic (TM0) mode. This paper outlines an integrated gallium phosphide-waveguide polarization rotator, which relies on the rotation of a horizontal slot by 45 degree at a wavelength of 700 nm. This will ultimately lead to the conception of a mode hybridization phenomeno
Polarization manipulation elements operating at visible wavelengths represent a critical component of quantum communication sub-systems, equivalent to their telecom wavelength counterparts. The method proposed involves rotating the optic axis of the polarized input light by an angle of 45 degree, thereby converting the fundamental transverse electric (TE0) mode to the fundamental transverse magnetic (TM0) mode. This paper outlines an integrated gallium phosphide-waveguide polarization rotator, which relies on the rotation of a horizontal slot by 45 degree at a wavelength of 700 nm. This will ultimately lead to the conception of a mode hybridization phenomenon in the waveguide. The simulation results demonstrate a polarization co
... Show MoreObjective: Evaluate the effects of different storage periods on flexural strength (FS) and degree of conversion (DC) of Bis-Acryl composite and Urethane dimethacrylate provisional restorative materials. Material and Methods: A total of 60 specimens were prepared from four temporary crown materials commercially available and assigned to four tested groups (n = 15 for each group): Prevision Temp, B&E CROWN, Primma Art, and Charm Temp groups. The specimens were stored in artificial saliva, and the FS was tested after 24 h, 7 d, and 14 d. A standard three-point bending test was conducted using a universal testing machine. Additionally, the DC was determined using a Fourier transform infrared spectroscopy (FTIR) device. The data were analyzed st
... Show MoreThe research aims to prepare preventive exercises in the boot camp style to enhance the efficiency of the ankle joint and reduce its injuries for young triple jump players, and to determine the effect of preventive exercises on improving the efficiency of the ankle joint. The researchers assumed statistically significant differences between the pre-and posttests in the research variables. The experimental approach was adopted to suit it, and the research sample was chosen from young triple jump players. The preventive approach prepared by the researchers was applied to the sample, and it included preventive exercises in the boot camp style with and without tools. The researchers concluded that preventive exercises in a boot camp style have
... Show MoreThe qualitative concept of training experienced athletes is not limited to strength training alone, but extends to general physical conditioning and, ultimately, to special strength training during the specific phases of athletic preparation, depending on the type of sport practiced. Since athletic training should not follow a single, monotonous pattern, the researchers adopted modern Boot camp exercises to develop special strength and biomechanical variables for female triple jump athletes. The study aimed to design Boot camp exercises specifically to enhance special strength and certain biomechanical indicators in young female triple jump athletes, and to identify the impact of these exercises on their performance. The researchers
... Show MoreThe efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show More