LED is an ultra-lightweight block cipher that is mainly used in devices with limited resources. Currently, the software and hardware structure of this cipher utilize a complex logic operation to generate a sequence of random numbers called round constant and this causes the algorithm to slow down and record low throughput. To improve the speed and throughput of the original algorithm, the Fast Lightweight Encryption Device (FLED) has been proposed in this paper. The key size of the currently existing LED algorithm is in 64-bit & 128-bit but this article focused mainly on the 64-bit key (block size=64-bit). In the proposed FLED design, complex operations have been replaced by LFSR left feedback technology to make the algorithm perform more efficiently and productively. The results of the cipher/decipher analysis, 15 NIST test, comparison between proposal FLED and original LED based on the results of correlation coefficient (CC)and Cosine Similarity (CS), execution time, and throughputs showed that the proposed FLED has faster cipher and more productive than the original LED; it is also more secure than the original LED.
Background:Â Various fluids in the oral environment can affect the surface roughness of resin composites. This in vitro study was conducted to determine the influence of the mouth rinses on surface roughness of two methacrylate-based resin (nanofilled and packable composite) and siloraine-based resin composites.
Materials and methods: Disc-shaped specimens (12 mm in diameter and 2mm in height) were prepared from three types of composi
... Show MoreCryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to
... Show Morehas experienced a step-change since the inception of ambient mass spectrometry removed the requirement for samples to be investigated under vacuum conditions. Approaches based on surface– plasma interactions are especially promising, including PADI. Whilst the mechanisms involved in generating PADI spectra still need to be unravelled, PADI shows significant promise to become a valuable and versatile tool in the instrumental arsenal available to the surface analyst
Many purposes require communicating audio files between the users using different applications of social media. The security level of these applications is limited; at the same time many audio files are secured and must be accessed by authorized persons only, while, most present works attempt to hide single audio file in certain cover media. In this paper, a new approach of hiding three audio signals with unequal sizes in single color digital image has been proposed using the frequencies transform of this image. In the proposed approach, the Fast Fourier Transform was adopted where each audio signal is embedded in specific region with high frequencies in the frequency spectrum of the cover image to sa
... Show MoreCryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms
... Show MoreThe research aims to identify the importance of using the style of the cost on the basis of activity -oriented in time TDABC and its role in determining the cost of products more equitably and thus its impact on the policy of allocation of resources through the reverse of the changes that occur on an ongoing basis in the specification of the products and thus the change in the nature and type of operations . The research was conducted at the General Company for Textile Industries Wasit / knitting socks factory was based on research into the hypothesis main of that ( possible to calculate the cost of activities that cause the production through the time it takes to run these activities can then be re- distributed product cost
... Show MoreThe ZnTe alloy was prepared as deposited thin films on the glass substrates at a thickness of 400±20 nm using vacuum evaporation technique at pressure (1 × 10-5) mbar and room temperature. Then the thin films under vacuum (2 × 10-3 mbar) were annealing at (RT,100 and 300) °C for one hour. The structural properties were studied by using X-ray diffraction and AFM, the results show that the thin films had approached the single crystalline in the direction (111) as preferred orientation of the structure zinc-blende for cubic type, with small peaks of tellurium (Te) element for all prepared thin films. The calculated crystallite size (Cs) decreased with the increase in the anne
... Show MoreAbstract
This research aims to examine the correlation and the influence of Authentic Leadership on the contextual performance as a dependent variable, in the departments and Division of the iraqi Ministry of Foreign Affairs To try out with a number of recommendations that contribute to raising the level of contextual performance in the Ministry. Starting from the importance of research in public organizations and its Role in society, the researcher adopted the descriptive analytical approach in accomplishing this research, The 99 people responded exclusively comprehensively, based on questionnaire that is include 28-item, using interviews and field observations as
... Show MoreThis study aims to the little impact of accounting financial performance (AFP) analysis on the money market in the Iraqi economy. Potentially limiting future market activity could be international risks and obstacles, which in turn could cause issues and crises (Shah & Jan, 2014; Bakhtiyarovich, 2020). The study concept was inspired by the recognition that there must be communication between the importance of the AFP analysis of the Iraqi securities market and the country’s financial and economic institutions. The sample of the study included ten Iraqi banks listed in the Iraq Stock Exchange (ISE) for the period 2010–2020. The three mathematical models included in the statistical analysis served as the basis for projectin
... Show More