To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DNA sequences. These DNA sequences are converted to RNA sequences. Finally, the RNA sequences are converted to the amino acid, where this sequence is considered as ciphertext to be sent to the receiver. The decryption phase also includes six steps, which are the same encryption steps but in reverse order. It starts with converting amino acid to RNA sequences, then converting RNA sequences to DNA sequences and converting them to their equivalent complementary DNA. After that, DNA sequences are converted to binary values and to their equivalent ASCII values. The final step is converting ASCII values to alphabet characters that are considered plaintext. For evaluation purposes, six text files with different sizes have been used as a test material. Performance evaluation is calculated based on encryption time and decryption time. The achieved results are considered as good and fast, where the encryption and decryption times needed for a file with size of 1k are equal to 2.578 ms and 2.625 ms respectively, while the encryption and decryption times for a file with size of 20k are equal to 268.422 ms and 245.469 ms respectively.
This study aims to apply the theory of "Text from Text and the Plus Dimension" in the analysis of the Prophetic discourse found in the section on the virtues of knowledge and scholars from Imam Sahih al-Bukhari's book. This section covers several topics, including the virtue of gathering for the sake of learning, the superiority of a scholar over a worshipper, the excellence of jurisprudence in the religion of Allah, the acquisition of knowledge through the passing away of scholars, the merit of inviting people to Allah, the continuing benefit of beneficial knowledge after a scholar's demise, the warning against seeking knowledge for purposes other than Allah, and the Prophet seeking refuge from knowledge tha
... Show MoreIn study of effective bioactive compounds, we have synthesized the Co((ІІ), Mn(ІІ), Fe(ІІ), Cu(ІІ), Ni(ІІ), and Zn(ІІ) complexes of the Schiff base derived from trimethoprim and2'-amino-4-chlorobenzophenone and characterized by spectroscopic (NMR, IR, Mass, UV–vis,), analytical, TGA studies and magnetic data .The solution electronic spectral study suggests the stoichiometry of the synthesized complexes and Elemental analysis detected the square planer and octahedral geometry of the compounds. The prepared metal complexes presented promoted efficiency versus the screened bacterial (Escherichia Coli and Staphylococcus aureus) antibacterial efficacy against (Staphylococcus aureus, Salmonella spp., E. coli, Vibrio spp., Pseud
... Show MoreNew Schiff base, namely [2-(carboxy methylene-amino)-phenyl imino] acetic acid (L) and its some metal complexes [LCo.2H2O], [LNi.2H2O], [LCu].3H2O, [LCd.2H2O], [LHg.2H2O] and [LPb.2H2O], were reported and characterized by elemental analysis, metal content, spectroscopic methods, magnetic moments and conductivity measurements, it is found that the geometrical structures of these complexes are octahedral [Co(II), Ni(II), Cd(II), Hg(II), Pb(II) and square planar Cu(II).The complexes have been found to posses 1:1 (M:L) stoichiometry
Neural cryptography deals with the problem of “key exchange” between two neural networks by using the mutual learning concept. The two networks exchange their outputs (in bits) and the key between two communicating parties ar eventually represented in the final learned weights, when the two networks are said to be synchronized. Security of neural synchronization is put at risk if an attacker is capable of synchronizing with any of the two parties during the training process.
In this article, a short review on the feature of reality and locality in quantum optics is given.
The Bell inequality and the Bell states are introduced to show their direct use in quantum computer and
quantum teleportation. Moreover, quantum cryptography is discussed in some details regarding basic
ideas and practical considerations. In addition, a case study involving distillation of a quantum key based
on the given fundamentals is presented and discussed.
Many condensed polymers [A1-A7] were prepared via reaction of (Ethylenediaminetetraacetic acid = EDTA), with different prepared imide-diamines by modification [ modification of amino acids and antibiotics (B1- B7)] Imide-diamines were prepared by chlorination of L-amino acids such as [ L-Histidine, L-Alanine, L-Valine, L-Glycine and L-Aspargine ] or selected antibiotics such as [Cephallixine monohydrate and Amoxilline ] with thionyl chloride at 0°C, then reacted with ammonia to obtain imidediamines [B1-B7] . The physical properties of all prepared condensed polymers [A1-A7], new prepared diamines [B1-B7] were studied and characterized by FT -IR spectroscope to certify the structural formulas. The thermal analysis (TGA, DTA) were studied, a
... Show MoreThe purpose of this research work is to synthesize conjugates of NSAIDs (ibuprofen, and naproxen) with sulfadiazine as possible mutual prodrugs to overcome the local gastric irritation of NSAIDs with free carboxyl group by formation of ester linkage that supposed to remain intact in stomach and may hydrolyze in intestine chemically or enzymatically; in addition to that attempting to target the synthesized derivative to the colon by formation of azo bond that undergo reduction only by colonic bacterial azoreductaze enzyme to liberate the parent compound to act locally (treatment of inflammation and infections in colon)
Coupling reaction of 4-amino antipyrene with 4-amino benzoic acid gave bidentate azo ligand. The prepared ligand was identified by Microelemental Analysis, 1HNMR, FT-IR and UV-Vis spectroscopic techniques. Treatment of the prepared ligand with the following metal ions (CoII, NiII, CuII and ZnII) in aqueous ethanol with a 1:2 M:L ratio and at optimum pH, yielded a series of neutral complexes of the general formula [M(L)2]Cl2 . The prepared complexes were characterized using flame atomic absorption, (C.H.N) Analysis, FT-IR and UV-Vis spectroscopic methods as well as magnetic susceptibility and conductivity measurements. Chloride ion content was also evaluated by (Mohr method). The nature of the complexes formed were studied following the mol
... Show More