The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capability and small size, while highlighting the requirement for study in the post-quantum cryptographic field to address the threats rising from quantum computing. The comparative analysis shows a comprehensive understanding that combines classical cryptography algorithms with up-to-date approaches such as chaotic-based system and post-quantum cryptography, confirming that the study addresses the future of cryptography security in the aspect of emerging challenge like quantum computing.
The problem of steady, laminar, natural convective flow in an square enclosure with and without partitions is considered for Rayleigh number (103-106) and Prandtl number (0.7). Vertical walls were maintained isothermal at different temperatures while horizontal walls and the partitions were insulated. The length of partition was taken constant. The number of partitions were placed on horizontal surface in staggered arrangement from (1– 3) and ratio of partition thickness (H/L= 0.033, 0.083, 0.124). The problem is formulated in terms of the vorticity-stream function procedure. A numerical solution based on a program in Fortran 90 with the finite difference method is obtained. Representative results illustrating the effects of the thickn
... Show MoreThe objective of the study: To diagnose the reality of the relationship between the fluctuations in world oil prices and their reflection on the trends of government spending on the various economic sectors.
The research found: that public expenditures contribute to the increase of national consumption through the purchase of consumer goods by the state for the performance of the state's duties or the payment of wages to employees in the public sector and thus have a direct impact on national consumption
The results of the standard tests showed that there is no common integration between the oil price fluctuations and the government expenditure on the security sector through the A
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreChaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
SM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023
Succinic acid is an essential base ingredient for manufacturing various industrial chemicals. Succinic acid has been acknowledged as one of the most significant bio based building block chemicals. Rapid demand for succinic acid has been noticed in the last 10 years. The production methods and mechanisms developed. Hence, these techniques and operations need to be revised. Recently, an omnibus rule for developing succinic acid is to find renewable carbohydrate Feedstocks. The sustainability of the resource is crucial to disintegrate the massive use of petroleum based-production. Accordingly, systematically reviewing the latest findings of bacterial production and related fermentation methods is critical. Therefore, this paper aims to stud
... Show MoreThe human stomach is home to the Gram-negative bacterium Helicobacter pylori, which has been connected to several gastrointestinal disorders. There may be a link between H. pylori infection and the start of autoimmune disorders, according to recent research. This review examines the intricate connections between persistent H. pylori infection, immune system dysregulation, and their possible role in initiating autoimmune disorders. The study begins with a summary of H. pylori infection and its prevalence worldwide, emphasizing the mounting data that connects this bacterium to autoimmune disorders. Then, using experimental data from animal models and epidemiological research as support, it undertakes a thorough review of autoimmune di
... Show MoreThe main objective of this study is to understand the work of the pile caps made of lightweight aerated foam concrete and study the many factors affecting the ability and the capacity of the shear. The study was done by analyzing previous practical and theoretical experiences on the reinforced concrete pile caps. The previous practical results indicated that all specimens failed by shear diagonal compression or tension modes except one specimen that failed flexural-shear mode. Based on test specimens' practical results and behavior, some theoretical methods for estimating the ultimate strength of reinforced concrete pile caps have been recommended, some of which evolved into the design documents available on the subject.
... Show MoreMany letters and theses written on the subject of consensus, as well as in measurement,
But we tried to address a topic of consensus
Building a blind measuring guide.
We have tried to explain the meaning of convening, then the statement of consensus in language and terminology and then the statement of measurement
Also, we have shown the types of consensus mentioned by the jurists, and this is how much was in the first topic, either
The second section included the statement of the doctrines of the blind in the matter, and then the evidence of each doctrine and discussed.
We followed it with the most correct opinion statement and concluded the research with some of the conclusions we reached through
search.