Preferred Language
Articles
/
ZRbWvYoBVTCNdQwCcKSK
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DNA sequences. These DNA sequences are converted to RNA sequences. Finally, the RNA sequences are converted to the amino acid, where this sequence is considered as ciphertext to be sent to the receiver. The decryption phase also includes six steps, which are the same encryption steps but in reverse order. It starts with converting amino acid to RNA sequences, then converting RNA sequences to DNA sequences and converting them to their equivalent complementary DNA. After that, DNA sequences are converted to binary values and to their equivalent ASCII values. The final step is converting ASCII values to alphabet characters that are considered plaintext. For evaluation purposes, six text files with different sizes have been used as a test material. Performance evaluation is calculated based on encryption time and decryption time. The achieved results are considered as good and fast, where the encryption and decryption times needed for a file with size of 1k are equal to 2.578 ms and 2.625 ms respectively, while the encryption and decryption times for a file with size of 20k are equal to 268.422 ms and 245.469 ms respectively.

Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Fri Mar 17 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Synthesis and Characterization of [N-(4-Methoxybenzoyl amino)-thioxomethyl ]Methionine acid (MbM) and It's Complexes with Some Divalent Transition Metals Ions (Mn , Co , Ni , Cu , Zn , Cd and Hg)
...Show More Authors

In this work , the ligand [N-(4-Methoxybenzoyl amino)-thioxomethyl] Methionine acid  has been synthesized by the reaction of 4- Methoxybenzoyl isothiocyanate with methionine acid . The metal complexes were prepared through the reaction of metals chlorides of Co(II) , Ni(II), Cu(II), Zn(II) and Cd(II) in ethanol as solvent . The ligand (MbM) and its metal complexes have been characterized by elemental analysis (CHNS), IR, 1H-13CNMR and UV- Vis spectra, magnetic susceptibility measurements, molar conductivity, melting points and atomic absorption. The metal-ligand ratio was determined by mole ratio method. The suggested structures for the Co(II), Ni(II), Cd(II) and Zn(II) complexes are tetrahedral geometry and  the Cu(II) complex

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2012
Journal Name
Advances In Physics Theories And Applications
Synthesis, Characterization, And Antibacterial Activities Of Manganese (II), Cobalt(II), Iron (II), Nickel (II) , zinc (II) And Cadmium(II) Mixed- Ligand Complexes Containing Amino Acid(L-Valine) And Saccharin
...Show More Authors

new six mixed ligand complexes of some transition metal ions Manganese (II), Cobalt(II), Iron (II), Nickel (II) , and non transition metal ion zinc (II) And Cadmium(II) with L-valine (Val H ) as a primary ligand and Saccharin (HSac) as a secondary ligands have been prepared. All the prepared complexes have been characterized by molar conductance, magnetic susceptibility infrared, electronic spectral, Elemental microanalysis (C.H.N) and AA . The complexes with the formulas [M(Val)2(HSac)2] M= Mn (II) , Fe (II) , Co(II) ,Ni(II), Cu (II),Zn(II) and Cd(II) L- Val H= (C5H11NO2) , C7H5NO3S The study shows that these complexes have octahedral geometry; The metal complexes have been screened for their in microbiological activities against bacteria.

... Show More
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 01 2008
Journal Name
Baghdad Science Journal
Tamper Detection in Text Document
...Show More Authors

Although text document images authentication is difficult due to the binary nature and clear separation between the background and foreground but it is getting higher demand for many applications. Most previous researches in this field depend on insertion watermark in the document, the drawback in these techniques lie in the fact that changing pixel values in a binary document could introduce irregularities that are very visually noticeable. In this paper, a new method is proposed for object-based text document authentication, in which I propose a different approach where a text document is signed by shifting individual words slightly left or right from their original positions to make the center of gravity for each line fall in with the m

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Nov 29 2019
Journal Name
Iraqi Journal Of Physics
Acetic acid concentration estimation using plastic optical fiber sensor based surface Plasmon resonance
...Show More Authors

Optical fiber chemical sensor based surface Plasmon resonance for sensing and measuring the refractive index and concentration for Acetic acid is designed and implemented during this work. Optical grade plastic optical fibers with a diameter of 1000μm were used with a diameter core of 980μm and a cladding of 20μm, where the sensor is fabricated by a small part (10mm) of optical fiber in the middle is embedded in a resin block and then the polishing process is done, after that it is deposited with about (40nm) thickness of gold metal and the Acetic acid is placed on the sensing probe.

View Publication Preview PDF
Crossref (9)
Crossref
Publication Date
Mon Nov 19 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Cryptography by Using"Hosoya"Polynomials for"Graphs Groups of Integer Modulen and"Dihedral Groups with'Immersion"Property
...Show More Authors

      In this paper we used Hosoya polynomial ofgroupgraphs Z1,...,Z26 after representing each group as  graph and using Dihedral group to"encrypt the plain texts with the immersion property which provided Hosoya polynomial to immerse the cipher text in another"cipher text to become very"difficult to solve.

View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Ieee Xplore
A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System
...Show More Authors

Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a

... Show More
Scopus (29)
Crossref (15)
Scopus Crossref
Publication Date
Fri Apr 05 2024
Journal Name
Tikret Journal Of Agricultural Sciences
Effect of adding Humic acid and spraying Boric acid on Growth and Yield of cauliflower Brassica oleracea var. botrytis
...Show More Authors

Publication Date
Sun Jul 03 2022
Journal Name
International Journal Of Health Sciences
effects of toxoplasmosis infection on the levels of IL-18 and anti-ds-DNA antibodies in SLE patients
...Show More Authors

The present study was set to demonstrate the prevalence of toxoplasmosis infection and its effects on patients with systemic  lupus erythematosus (SLE) through determining their serum levels of anti-dsDNA and IL-18 antibodies. For this purpose, the sera from 132 SLE and/or toxoplasmosis patients and 30 healthy women, were collected. The study sample was divided into four groups of SLE, toxoplasmosis, SLE coinfected with toxoplasmosis, and healthy control. Anti-Toxoplasma IgG antibodies were examined for all the samples using ELISA kit. The results showed a high mean level of anti-Toxoplasma IgG among SLE patients coinfected with toxoplasmosis (104.8792±12.31585pg/ml) in comparison to that in toxoplasmosis patients (91.1705±12.577

... Show More
View Publication
Crossref