Many cryptosystems and security techniques use substitution boxes to ensure the data’s secure communication. A new technique is presented for generating a robust S-box to fulfill security requirements. The AES algorithm represents a block cipher cryptographic algorithm. It was selected by the National Institute of Science and Technology as the optimal cryptographic algorithm in 2011. Through the study of the properties of original S-BOX, this algorithm has been subjected to a number of attacks (linear, differential, statistical, and interpolation), and original S-BOX has been static, which makes the attack strong and shows a weakness in the algorithm. It is necessary to make this algorithm more efficient and powerful through
... Show MoreDBN Rashid, Al- Utroha Journal, 2018
DBNRHM Sami, International Journal of Research in Social Sciences and Humanities, 2020
This study examines postgraduate students’ awareness of pragmatic aspects, including Grice Maxims, Politeness, and Direct and Indirect forms of speech. According to Paul Grice’s theory of implicature, which is considered one of the most important contributions to pragmatics, this paper discusses how postgraduate students can meet the cooperative principle when communicating effectively. It also outlines how does politeness principles influence obeying or violating the maxims and how is the use of direct or indirect forms of utterances prompted by politeness. Sixteen master’s students of Linguistics and Literature were asked to take a multiple-choice test. The test will be represented along with the interpretation of each optio
... Show MoreIn this research paper, we explain the use of the convexity and the starlikness properties of a given function to generate special properties of differential subordination and superordination functions in the classes of analytic functions that have the form in the unit disk. We also show the significant of these properties to derive sandwich results when the Srivastava- Attiya operator is used.
Let L be a commutative ring with identity and let W be a unitary left L- module. A submodule D of an L- module W is called s- closed submodule denoted by D ≤sc W, if D has no proper s- essential extension in W, that is , whenever D ≤ W such that D ≤se H≤ W, then D = H. In this paper, we study modules which satisfies the ascending chain conditions (ACC) and descending chain conditions (DCC) on this kind of submodules.
Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show MoreBackground: Malignant lymphomas represent about 5% of all malignancy of the head and neck region which can involve lymph nodes as well as soft tissue and bone of the maxillofacial region. Apoptosis is considered a vital component of various processes including normal cell turnover, proper development and functioning of the immune system. Inappropriate apoptosis is a factor in many human conditions including neurodegenerative diseases, ischemic damage, autoimmune disorders and many types of cancer. Expression of p53 Proteins in Hodgkin׳s and Non Hodgkin׳s lymphomas suggested that it can help in monitoring of patients and the markers may aid in controlling the progression of lymphoma and detect the degree of aggressiveness of the diseas
... Show MoreBackground: Considering the antioxidant, anti-inflammatory, and antimicrobial properties of green tea, this study aimed to evaluate the histopathological effect of the sulcular irrigation of green tea extract in the treatment of experimental gingivitis in rabbit.
Materials and methods: For this experimental study, 45 male rabbits, separated in two groups, control non- irrigated group (5rabbits) and study group (40 rabbits), gingivitis induced by ligatures was packed subgingivally in the lower right central incisors of the experimental group for seven days. Then, the animals were randomly designated to two irrigated groups (20 rabbits
... Show More