Preferred Language
Articles
/
8xhTLJUBVTCNdQwCWSnt
A Comprehensive Review on Cryptography Algorithms: Methods and Comparative Analysis
...Show More Authors

The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capability and small size, while highlighting the requirement for study in the post-quantum cryptographic field to address the threats rising from quantum computing. The comparative analysis shows a comprehensive understanding that combines classical cryptography algorithms with up-to-date approaches such as chaotic-based system and post-quantum cryptography, confirming that the study addresses the future of cryptography security in the aspect of emerging challenge like quantum computing.

Crossref
View Publication
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Crossref
Publication Date
Fri Aug 02 2024
Journal Name
Quantum Studies: Mathematics And Foundations
Implementation of a modified noise-free and noisy multistage quantum cryptography protocol using QISKIT
...Show More Authors

Classical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. T

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Oct 20 2018
Journal Name
Journal Of Economics And Administrative Sciences
Methods of Foreign Trade Payments -Comparative Accounting Study-
...Show More Authors

 The research has been concerned with the modalities of foreign trade payments (foreign trade financing), and made an accounting comparison between them to choose the best way to pay for the imported goods (payment of the real values of imported goods), given the importance of the impact of this activity on the national economy of all countries of the world, especially Iraq for the adoption of a very large amount of imported goods to meet the requirements of the people, which require the flow of huge amounts of foreign currency outside Iraq to pay for these goods, and therefore dealing incorrectly with it leads to the destruction of the national economy and the spread of a number of negative social and economic phenomena of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 10 2009
Journal Name
Iraqi Journal Of Laser
Real Time Quantum Bit Error Rate Performance Test for a Quantum Cryptography System Based on BB84 protocol
...Show More Authors

In this work, the performance of the receiver in a quantum cryptography system based on BB84 protocol is scaled by calculating the Quantum Bit Error Rate (QBER) of the receiver. To apply this performance test, an optical setup was arranged and a circuit was designed and implemented to calculate the QBER. This electronic circuit is used to calculate the number of counts per second generated by the avalanche photodiodes set in the receiver. The calculated counts per second are used to calculate the QBER for the receiver that gives an indication for the performance of the receiver. Minimum QBER, 6%, was obtained with avalanche photodiode excess voltage equals to 2V and laser diode power of 3.16 nW at avalanche photodiode temperature of -10

... Show More
View Publication Preview PDF
Publication Date
Sat Mar 10 2012
Journal Name
الدنانير
Cryptography Using Artificial Neural Network
...Show More Authors

Neural cryptography deals with the problem of “key exchange” between two neural networks by using the mutual learning concept. The two networks exchange their outputs (in bits) and the key between two communicating parties ar eventually represented in the final learned weights, when the two networks are said to be synchronized. Security of neural synchronization is put at risk if an attacker is capable of synchronizing with any of the two parties during the training process.

Preview PDF
Publication Date
Thu Jun 20 2019
Journal Name
Baghdad Science Journal
A Comparative Analysis of the Zernike Moments for Single Object Retrieval
...Show More Authors

Zernike Moments has been popularly used in many shape-based image retrieval studies due to its powerful shape representation. However its strength and weaknesses have not been clearly highlighted in the previous studies. Thus, its powerful shape representation could not be fully utilized. In this paper, a method to fully capture the shape representation properties of Zernike Moments is implemented and tested on a single object for binary and grey level images. The proposed method works by determining the boundary of the shape object and then resizing the object shape to the boundary of the image. Three case studies were made. Case 1 is the Zernike Moments implementation on the original shape object image. In Case 2, the centroid of the s

... Show More
View Publication Preview PDF
Crossref (2)
Clarivate Crossref
Publication Date
Mon Jun 08 2020
Journal Name
Research Journal Of Chemistry And Environment
High Performance Liquid Chromatographic and Areaunder Curve spectrophotometric Methods forEstimation of Cefixime in Pure and MarketedFormulation: A Comparative Study
...Show More Authors

Cefixime is an antibiotic useful for treating a variety ofmicroorganism infections. In the present work, tworapid, specific, inexpensive and nontoxic methods wereproposed for cefixime determination. Area under curvespectrophotometric and HPLC methods were depictedfor the micro quantification of Cefixime in highly pureand local market formulation. The area under curve(first technique) used in calculation of the cefiximepeak using a UV-visible spectrophotometer.The HPLC (2nd technique) was depended on thepurification of Cefixime by a C18 separating column250mm (length of column) × 4.6 mm (diameter)andusing methanol 50% (organic modifier) and deionizedwater 50% as a mobile phase. The isocratic flow withrate of 1 mL/min was applied, the temper

... Show More
Publication Date
Fri Apr 25 2025
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences (ihjpas)
Spectrophotometric Investigations for Simultaneous Analysis of Certain Antibacterial: A Brief Review
...Show More Authors

Antibacterial substances belong to a group of compounds that attack dangerous microorganisms. Therefore, killing bacteria or reducing their metabolic activity will lessen their adverse effects on a biological system. They originated from either synthetic materials, microbes, or mold. Many of these medications treat the gram-negative bacteria from the critical precedence group, such as pseudomonas, carbapenem-resistant acinetobacter, and enterobacterales. This study aims to investigate the simultaneous analysis of specific antibacterial spectrophotometrically. The WHO maintains this list of priority infections with antibiotic resistance. Drug combinations in single dosage forms are becoming increasingly popular in the pharmaceutical industry

... Show More
Publication Date
Wed Feb 01 2023
Journal Name
Journal Of Safety Research
Analysis of prevention through design studies in construction: A subject review
...Show More Authors

View Publication
Scopus (20)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
6G Wireless Communications Networks: A Comprehensive Survey
...Show More Authors

View Publication
Scopus (413)
Crossref (402)
Scopus Clarivate Crossref