Classical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. The suggested multistage QKD applies different random commutative sets of Euler’s angles to the transmitted qubits. If Eve successfully hacked the Euler’s angles of a transmitted qubit, Bob will predict the hacking event because other bits apply different Euler’s angles. The commutative sets of Euler’s angles should be selected by a prior agreement between Alice and Bob. Our approach provides additional security proof for the multistage QKD protocol enabling safe public sharing of a sifted key between the sender and receiver
Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show MoreMaking the data secure is more and more concerned in the communication era. This research is an attempt to make a more secured information message by using both encryption and steganography. The encryption phase is done with dynamic DNA complementary rules while DNA addition rules are done with secret key where both are based on the canny edge detection point of the cover image. The hiding phase is done after dividing the cover image into 8 blocks, the blocks that are used for hiding selected in reverse order exception the edge points. The experiments result shows that the method is reliable with high value in PSNR
In this paper, we have examined the effectiveness exchange of optical vorticity via three-wave mixing (TWM) technique in a four-level quantum dot (QD) molecule by means of the electron tunneling effect. Our analytical analysis demonstrates that the TWM procedure can result in the production of a new weak signal beam that may be absorbed or amplified within the QD molecule. We have taken into account the electron tunneling as well as the relative phase of the applied lights to assess the absorption and dispersion characteristics of the newly generated light. We have discovered that the slow light propagation and signal amplification can be achieved. Our results show that the exchange o
Due to the scientific and technical development in the free electron laser devices and the accompanying industrial and technological progress in various fields of civil and military life, it became necessary to expand the understanding of the mechanism of interaction of electrons (as an effective medium) with the magnetic field that they pass through to form coherent photons.
In this paper, the Lorentz force effect is simulated and analysed. The results showed that the Lorentz force originates from the magnetic field, making the electron move through it oscillate. This sinusoidal motion of the electron causes it to emit two photons for every electron wavelength. It has been concluded that the electron velocity directly affe
... Show MoreThe fluorescence and absorption spectra of Fluoranthene dissolved in
cyclohexane and ethanol were studied and analyzed. The effect of the
concentration of this molecule and the polarity of the solvents on the spectral
shifts and on relative intensity has been investigated. A computational program
was written in order to convert the spectra from grapher to data. Some
photophysical parameters such as oscillator strength and quantum efficiency have
been calculated. Fluorescence quantum efficiency of Fluoranthene was measured
relative to Quinine Sulfate (QS) in 1N H2SO4. The obtained values were (0.5) in
cyclohexane and (0.45) in ethanol
Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreIn this study a DFT calculation on cyclopropanone, cyclopropandione and cyclopropantrione molecules was performed using the basis function 6-31G ** / MP2 and exchange correlation potential B3-LYP. The results showed that the ground state of all molecules geometry belong to the point group ð¶2ð‘£where a vibronic coupling between the vibrational motion with the electronic ground state in the molecule C3O3 this leads to a reduction in symmetry of the molecule fromð·3â„Žto ð¶2ð‘£, the driving force of this process is accessing to the electronic configuration complies with Hückel aromatic systems with two electrons. Also in this, study the normal modes of vibration, frequencies, intensities and symm
... Show MoreIn this paper, we describe a new method for image denoising. We analyze properties of the Multiwavelet coefficients of natural images. Also it suggests a method for computing the Multiwavelet transform using the 1st order approximation. This paper describes a simple and effective model for noise removal through suggesting a new technique for retrieving the image by allowing us to estimate it from the noisy image. The proposed algorithm depends on mixing both soft-thresholds with Mean filter and applying concurrently on noisy image by dividing into blocks of equal size (for concurrent processed to increase the performance of the enhancement process and to decease the time that is needed for implementation by applying the proposed algorith
... Show More