Symmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a randomly predefined set of key numbers of size n via the Donald E. Knuths SRNG algorithm (subtractive method). The second phase uses the output key (or seed value) from the previous phase as input to the Latin square matrix (LSM) to formulate a new key randomly. To increase the complexity of the generated key, another new random key of the same length that fulfills Shannon’s principle of confusion and diffusion properties is XORed. Four test keys for each 128, 192,256,512, and 1024–bit length are used to evaluate the strength of the proposed model. The experimental results and security analyses revealed that all test keys met the statistical National Institute of Standards (NIST) standards and had high values for entropy values exceeding 0.98. The key length of the proposed model for n bits is 25*n, which is large enough to overcome brute-force attacks. Moreover, the generated keys are very sensitive to initial values, which increases the complexity against different attacks.
ABSTRACT Wound is damage or disruption to the normal anatomical structure and function. Carrageenan is sulphated polysaccharide found in Gigartina, Chondrus and Eucheuma species in the red algal family. Having anticancer, anti-inflammatory and renewal of tissues. Our study aimed to detect the role of kappa carrageenan in the burned skin wound repair. Skin burn were performed in the right and left cheek of 20 male rats (aged 7-8 weeks weighing 300-350 g). Burned skin rats were categorized into two equal groups. Burned areas of right side were treated with a local application of 1 ml of kappa carrageenan solution once daily (treatment group) and the left side receive no treatment (control group). After 5, and 10 days, 5 rats from each
... Show MoreAn efficient modification and a novel technique combining the homotopy concept with Adomian decomposition method (ADM) to obtain an accurate analytical solution for Riccati matrix delay differential equation (RMDDE) is introduced in this paper . Both methods are very efficient and effective. The whole integral part of ADM is used instead of the integral part of homotopy technique. The major feature in current technique gives us a large convergence region of iterative approximate solutions .The results acquired by this technique give better approximations for a larger region as well as previously. Finally, the results conducted via suggesting an efficient and easy technique, and may be addressed to other non-linear problems.
Abstract:
The research concerned the study of the railway transport sector in selected countries that sought to raise the efficiency of the railway network and develop it, after realizing the importance of this vital sector, which is a link between it and the rest of the other economic sectors.
The research sought to explain the methods, methods and procedures adopted by these countries for the development of the railway sector, and to benefit from these experiments to improve the efficiency of the railway transport sector in Iraq.
The railway transport sector in Iraq suffers from the erosion of railway lines and mobile units such as locomotives, pas
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreStudy Purpose. highlighting the origins of the sport's philosophy. Studying the development of the sport of kendo across different historical periods and its adaptation to societal and cultural changes. Identifying the establishment of the most prominent organizations and federations that contributed to its development, and exploring the sport's basic tools and rules and its most prominent championships. Materials and Methods. The historical approach was adopted in studying the historical process of the development of kendo, as it is appropriate to the nature of the problem. The information has been simplified and presented in a sequential manner that presents the development of the sport of kendo, starting from the origins of its p
... Show MoreThis research aims at highlighting the strategic role of human resource development in developing competitive advantage in light of the great challenges and rapid changes witnessed in recent years in the business world. The human element is the main engine of the organization's resources, especially when it possesses the skill quality and cognitive abilities commensurate with the nature of work. Therefore, this research focuses on the importance of human resources development strategy in contemporary organizations and reviews the summary of literature and theoretical foundations related to human resources development, as well as various philosophical concepts related to the competitive advantage and to indicate the important role
... Show MoreThrough his female characters, Walt Disney was able to reflect the
development of the general outlook upon women in the Western world over a period
of sixty years.
This paper sheds light in how the cartoon characters changed in their reaction
to problems and means of solving them from the 30s through to the 90s of the
previous century. The main characters will be seen according to the films’ dates of
production and release.
The research aims at clarifying the role of green human resource management practices in achieving sustainable development. The research problem is that the health sector is less concerned with environmental aspects, specifically green human resource management practices, Which are reflected on sustainable development with their economic, environmental and social dimensions as well as reducing costs, waste minimization and recycling, And the research started from two main hypotheses to explore the correlation and influence between the variables of the research by analyzing the answers of the research sample, which included (136) employees of the Al-Imamein Al-kadhemein medical city, Data and information were collected using quest
... Show MoreThe research aims to evaluate Evaluation of the investments Iraqi fund for External development through the application of financial tools to a number of companies of the Iraqi Fund for External Development, and from the point of view to achieve the best returns from investment and the feasibility of the investments of the Iraqi Fund for External Development and the research community represents the Iraqi Fund for External Development and the amount of (28) A company, while the research sample is (4) companies (the Arab Petroleum Transportation Services Company, the Arab Iraqi Company for Livestock Development, the Bauhaus Company for prefabricated buildings and mineral installations, the Arab Fisheries Company) that were chosen
... Show More