Preferred Language
Articles
/
ZRbWvYoBVTCNdQwCcKSK
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DNA sequences. These DNA sequences are converted to RNA sequences. Finally, the RNA sequences are converted to the amino acid, where this sequence is considered as ciphertext to be sent to the receiver. The decryption phase also includes six steps, which are the same encryption steps but in reverse order. It starts with converting amino acid to RNA sequences, then converting RNA sequences to DNA sequences and converting them to their equivalent complementary DNA. After that, DNA sequences are converted to binary values and to their equivalent ASCII values. The final step is converting ASCII values to alphabet characters that are considered plaintext. For evaluation purposes, six text files with different sizes have been used as a test material. Performance evaluation is calculated based on encryption time and decryption time. The achieved results are considered as good and fast, where the encryption and decryption times needed for a file with size of 1k are equal to 2.578 ms and 2.625 ms respectively, while the encryption and decryption times for a file with size of 20k are equal to 268.422 ms and 245.469 ms respectively.

Publication Date
Wed Jun 10 2009
Journal Name
Iraqi Journal Of Laser
Real Time Quantum Bit Error Rate Performance Test for a Quantum Cryptography System Based on BB84 protocol
...Show More Authors

In this work, the performance of the receiver in a quantum cryptography system based on BB84 protocol is scaled by calculating the Quantum Bit Error Rate (QBER) of the receiver. To apply this performance test, an optical setup was arranged and a circuit was designed and implemented to calculate the QBER. This electronic circuit is used to calculate the number of counts per second generated by the avalanche photodiodes set in the receiver. The calculated counts per second are used to calculate the QBER for the receiver that gives an indication for the performance of the receiver. Minimum QBER, 6%, was obtained with avalanche photodiode excess voltage equals to 2V and laser diode power of 3.16 nW at avalanche photodiode temperature of -10

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 20 1990
Journal Name
المجلة العراقية للعلوم
INACTIVATION OF GENTAMYCIN AND STREPTOMYCIN TOXICITY AGAINST E.COLI BY AMINO ACID SUPPLEMENTATION
...Show More Authors

Various nutritional solutions given to patients contain amino acids. Possible interference of this supplementation with selected aminoglycoside antiboiotics, namely gentamycin and streptomycin was evaluated in vitro. In minimal medium, E.coli was inhibited by gentamycin and by streptomycin. Circumvention of this inhibition was obtained with a mixture of 20 amino acids in the medium. Deletion of amino acids revealved that circumvention. specific amino acids were required for such Deletion of the aromatic amino acids or cysteine abolished the protection against gentamycin and streptomycin, while the deletion of the branched chain amino acids abolished the protection against streptomycin only. Thereonine, on the other hand, appears to be essen

... Show More
Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
Fast lightweight encryption device based on LFSR technique for increasing the speed of LED performance
...Show More Authors

LED is an ultra-lightweight block cipher that is mainly used in devices with limited resources. Currently, the software and hardware structure of this cipher utilize a complex logic operation to generate a sequence of random numbers called round constant and this causes the algorithm to slow down and record low throughput. To improve the speed and throughput of the original algorithm, the Fast Lightweight Encryption Device (FLED) has been proposed in this paper. The key size of the currently existing LED algorithm is in 64-bit & 128-bit but this article focused mainly on the 64-bit key (block size=64-bit). In the proposed FLED design, complex operations have been replaced by LFSR left feedback technology to make the algorithm perform more e

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Wed Apr 05 2023
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
A Partial Face Encryption in Real World Experiences Based on Features Extraction from Edge Detection
...Show More Authors

User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Sun Dec 25 2022
Journal Name
International Journal Of Drug Delivery Technology
Effect of Zinc drug on amino acid concentration in liver of white mice, Mus musculus
...Show More Authors

Zinc is one of the essential trace elements, it plays a key role in many biochemical and functional processes. It is less harmful than many other minerals, in the case of exposure to high doses of zinc, poisoning occurs, and this poisoning may mostly result from the accidental ingestion of household products containing zinc or nutritional supplements, this study was conducted to find out the effects of zinc on the concentration of amino acid. A total of 30 adult white mouse males were taken and divided into three groups; the first group (control) of 10 mice taken with distilled water for 30 days, the second group includes 10 mice that were dose with Zn drug concentration of 50 mg/kg/day for 30 days, the third group includes 10 mice that wer

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Tue Feb 18 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
A Comprehensive Review on Cryptography Algorithms: Methods and Comparative Analysis
...Show More Authors

The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi

... Show More
View Publication
Crossref
Publication Date
Wed Aug 11 2021
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
Survey on 3D Content Encryption
...Show More Authors

<p class="0abstract">The rapidly growing 3D content exchange over the internet makes securing 3D content became a very important issue. The solution for this issue is to encrypting data of 3D content, which included two main parts texture map and 3D models. The standard encryption methods such as AES and DES are not a suitable solution for 3D applications due to the structure of 3D content, which must maintain dimensionality and spatial stability. So, these problems are overcome by using chaotic maps in cryptography, which provide confusion and diffusion by providing uncorrelated numbers and randomness. Various works have been applied in the field of 3D content-encryption based on the chaotic system. This survey will attempt t

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Jan 25 2024
Journal Name
Iraqi Journal Of Agricultural Sciences
EFFECTS OF MINERAL FERTILIZATION AND SPRAYING WITH SALICYLIC ACID AND AMINO ACIDS ON THE GROWTH AND PRODUCTIVITY OF INDUSTRIAL POTATOES
...Show More Authors

This experiment was carried out at a private field in the eastern Radwaniyah Baghdad for the fall season 2020/2021 and spring 2021 to study the effects of adding mineral fertilizers, spraying salicylic acid and amino acids on some growth traits and yield of industrial potato plants. 200 kg N h-1 , 100 kg P2O5 h-1, 100 kg K2O h-1 and F2 consist of 275 kg N h-1, 180 kg P2O5 h-1, 200 K2O h-1 and F3 consist of 350 kg N h-1, 360 kg P2O5 h-1, 300 K2O h-1 and salicylic acid in three concentrations of 0,50 and 100 mg L-1 ( S1, S2, S3) and amino acids in three concentrations of 0, 1.25 and 2.5 ml L-1 ( A1, A2 , A3) It was carried out as a factorial split plot experiment, where the fertilizer levels (F1, F2 and F3) are in the main plot and th

... Show More
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Computers, Materials &amp; Continua
Severity Based Light-Weight Encryption Model for Secure Medical Information System
...Show More Authors

View Publication
Scopus (16)
Crossref (16)
Scopus Clarivate Crossref
Publication Date
Thu Mar 09 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Corrosion Inhibition of Aluminium in Acidic Medium using Amino Acid (Methionine)
...Show More Authors

  Corrosion behavior of aluminium in 0.6 mol. dm-3 NaCl solution in acidic medium 0.7 was investigated in the absence and presence of different concentrations of amino acid, methionine, as environmentally – friendly corrosion inhibitor over temperature range (293-308)K. The investigation involved electrochemical polarization method using potentiostatic technique and optical microscopy, the inhibition efficiency increased with an increase in inhibitor concentration but decreased with increase in temperature. Results showed that the inhibition occurs through adsorption of the inhibitor molecules on the metal surface and it was found to obey Langmuir adsorption isotherm. Some thermodynamic parameters ∆. and activation ener

... Show More
View Publication Preview PDF