To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DNA sequences. These DNA sequences are converted to RNA sequences. Finally, the RNA sequences are converted to the amino acid, where this sequence is considered as ciphertext to be sent to the receiver. The decryption phase also includes six steps, which are the same encryption steps but in reverse order. It starts with converting amino acid to RNA sequences, then converting RNA sequences to DNA sequences and converting them to their equivalent complementary DNA. After that, DNA sequences are converted to binary values and to their equivalent ASCII values. The final step is converting ASCII values to alphabet characters that are considered plaintext. For evaluation purposes, six text files with different sizes have been used as a test material. Performance evaluation is calculated based on encryption time and decryption time. The achieved results are considered as good and fast, where the encryption and decryption times needed for a file with size of 1k are equal to 2.578 ms and 2.625 ms respectively, while the encryption and decryption times for a file with size of 20k are equal to 268.422 ms and 245.469 ms respectively.
2-Amino-5-aryl- 1,3-thiazole-4-carboxylic acid (A1-A3) were synthesized from the reaction of various aromatic aldehyde with dichloro acetic acid and thiourea. The synthesis of 2-[[(Saminosulfinim-idoyl)(aryl)methyl](benzoyl)amino]-5-aryl-1,3-thiazole-4-carboxylic acid (A22-A30) was perfomed starting from (A1-A3) by two steps using Schiff's base (A4-A12) prepared from the reactant compounds (A1-A3) with different aromatic aldehyde. Finally two types of imide derivatives were obtained from reactant compounds (A1-A3) with malic anhydride (A31-A33) and phthalic anhydride (A34-A36) in the presence of glacial acetic acid. All proposed structures were supported by FT-IR and UV-Visible spectroscopic data.
In study of effective bioactive compounds, we have synthesized the Co((ІІ), Mn(ІІ), Fe(ІІ), Cu(ІІ), Ni(ІІ), and Zn(ІІ) complexes of the Schiff base derived from trimethoprim and2'-amino-4-chlorobenzophenone and characterized by spectroscopic (NMR, IR, Mass, UV–vis,), analytical, TGA studies and magnetic data .The solution electronic spectral study suggests the stoichiometry of the synthesized complexes and Elemental analysis detected the square planer and octahedral geometry of the compounds. The prepared metal complexes presented promoted efficiency versus the screened bacterial (Escherichia Coli and Staphylococcus aureus) antibacterial efficacy against (Staphylococcus aureus, Salmonella spp., E. coli, Vibrio spp., Pseud
... Show MoreIn this article, a short review on the feature of reality and locality in quantum optics is given.
The Bell inequality and the Bell states are introduced to show their direct use in quantum computer and
quantum teleportation. Moreover, quantum cryptography is discussed in some details regarding basic
ideas and practical considerations. In addition, a case study involving distillation of a quantum key based
on the given fundamentals is presented and discussed.
Neural cryptography deals with the problem of “key exchange” between two neural networks by using the mutual learning concept. The two networks exchange their outputs (in bits) and the key between two communicating parties ar eventually represented in the final learned weights, when the two networks are said to be synchronized. Security of neural synchronization is put at risk if an attacker is capable of synchronizing with any of the two parties during the training process.
New Schiff base, namely [2-(carboxy methylene-amino)-phenyl imino] acetic acid (L) and its some metal complexes [LCo.2H2O], [LNi.2H2O], [LCu].3H2O, [LCd.2H2O], [LHg.2H2O] and [LPb.2H2O], were reported and characterized by elemental analysis, metal content, spectroscopic methods, magnetic moments and conductivity measurements, it is found that the geometrical structures of these complexes are octahedral [Co(II), Ni(II), Cd(II), Hg(II), Pb(II) and square planar Cu(II).The complexes have been found to posses 1:1 (M:L) stoichiometry
A series of coumarin derivatives linked to amino acid ester side chains were synthesized and evaluated of their antibacterial and antifungal activity. The coumarin derivatives was alkylated by the ethyl bromoacetate and then using potassium carbonate to get alkylated hymecromone. Conventional solution method for amide bond formation was used as a coupling method between the carboxy-protected amino acids with acetic acid side chain of coumarin derivatives. The DCC/ HOBt coupling reagents were used for peptide bond formation. The proposed analogues were successfully synthesized and their structural formulas were consistent with the proposed struct
... Show MoreCoupling reaction of 4-amino antipyrene with 4-amino benzoic acid gave bidentate azo ligand. The prepared ligand was identified by Microelemental Analysis, 1HNMR, FT-IR and UV-Vis spectroscopic techniques. Treatment of the prepared ligand with the following metal ions (CoII, NiII, CuII and ZnII) in aqueous ethanol with a 1:2 M:L ratio and at optimum pH, yielded a series of neutral complexes of the general formula [M(L)2]Cl2 . The prepared complexes were characterized using flame atomic absorption, (C.H.N) Analysis, FT-IR and UV-Vis spectroscopic methods as well as magnetic susceptibility and conductivity measurements. Chloride ion content was also evaluated by (Mohr method). The nature of the complexes formed were studied following the mol
... Show More