Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show MoreThis work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreSince Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of t
... Show MoreObjective: The approximate life span of a silicone maxillofacial prosthesis is as short as1.5–2 years of clinical service, then a new prosthesis should be fabricated. The most common reasonfor re-making the prosthesis is silicone mechanical properties degradation. The aim of this studywas to assess some mechanical properties of VST-30 silicone for maxillofacial prostheses after addi-tion of intrinsic pigments.Methods: Two types of intrinsic pigments (rayon flocking and burnt sienna); each of them wasincorporated into silicone. One hundred and twenty samples were prepared and split into 4 groupsaccording to the conducted tests (tear strength, hardness, surface roughness, and tensile strengthand elongation percentage) with 30 samples for ea
... Show MoreThe organizational culture is an effective control mechanism that dictates the behavior of employees and according to their intellectual and social orientations, so it is considered a more powerful way to control employee orientations and determine their management according to organizational rules and regulations, as it was one of the most important factors determining the performance of organizations, while organizational performance is a measure of what the organization has achieved from the objectives of the scheme To ensure that it faces various changes and remains within the global competition, and to reach that it was necessary to identify the most prominent and most important research problems in knowing the extent of com
... Show MoreThe aim of this paper to study the effect of the implicit factors on the entrepreneurial spirit of the students of the Algerian university. Our structural model was proposed based on the model (Shapiro et Sokol, 1982) and the model (Ajzen, 1991). We tested it on a sample of 163 university students at the University of Algiers 3. The model consists of a set of variables (the intention of contracting as a dependent variable, structural and social educational support as independent variables). The results showed that educational and social support factors affect the entrepreneurial spirit of students more than structural support. The Applied Impacts are the enhancing of knowledge capacities of university stu
... Show MoreThe importance of news broadcasts in society has increased after the domination of television over the mass media, especially after emerging the satellite channels, and spreading the satellite dishes among the public at large.
As well as the great role played by the modern technology in the transmission of news and events happening at once. Such role has contributed, significantly, in changing the concept and values of the news. The live broadcast of the events filmed is the news itself.
In the midst of the great transformations and circumstances that Iraq went through after 2003, which witnessed political and security instability, and the large increase in the number of media, especially satellite channels, in Iraq
... Show More