Symmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a randomly predefined set of key numbers of size n via the Donald E. Knuths SRNG algorithm (subtractive method). The second phase uses the output key (or seed value) from the previous phase as input to the Latin square matrix (LSM) to formulate a new key randomly. To increase the complexity of the generated key, another new random key of the same length that fulfills Shannon’s principle of confusion and diffusion properties is XORed. Four test keys for each 128, 192,256,512, and 1024–bit length are used to evaluate the strength of the proposed model. The experimental results and security analyses revealed that all test keys met the statistical National Institute of Standards (NIST) standards and had high values for entropy values exceeding 0.98. The key length of the proposed model for n bits is 25*n, which is large enough to overcome brute-force attacks. Moreover, the generated keys are very sensitive to initial values, which increases the complexity against different attacks.
As an important resource, entanglement light source has been used in developing quantum information technologies, such as quantum key distribution(QKD). There are few experiments implementing entanglement-based deterministic QKD protocols since the security of existing protocols may be compromised in lossy channels. In this work, we report on a loss-tolerant deterministic QKD experiment which follows a modified “Ping-Pong”(PP) protocol. The experiment results demonstrate for the first time that a secure deterministic QKD session can be fulfilled in a channel with an optical loss of 9 dB, based on a telecom-band entangled photon source. This exhibits a conceivable prospect of ultilizing entanglement light source in real-life fiber-based
... Show MoreThis Research deals with estimation the reliability function for two-parameters Exponential distribution, using different estimation methods ; Maximum likelihood, Median-First Order Statistics, Ridge Regression, Modified Thompson-Type Shrinkage and Single Stage Shrinkage methods. Comparisons among the estimators were made using Monte Carlo Simulation based on statistical indicter mean squared error (MSE) conclude that the shrinkage method perform better than the other methods
This research shows the importance of Baghdad in the field of urban heritage and was demonstrated in the Ibn al-Fiqh al-Hamdani's book Baghdad the City of Peace in which he focused on many urban aspects and reviewing its historical importance by connecting them with modern events and the role they play in cultural and civilized construction which included: mosques, schools and markets etc. and the service providing institutions and other pillars of the Islamic cities through showing the development back then and its importance as an integral part of the urban and cultural heritage of the Islamic cities in general and Baghdad city in particular.
In his book Baghdad the City of Peace, Ibn al-Faqih Hamadhaani
... Show MoreIn this paper, compared eight methods for generating the initial value and the impact of these methods to estimate the parameter of a autoregressive model, as was the use of three of the most popular methods to estimate the model and the most commonly used by researchers MLL method, Barg method and the least squares method and that using the method of simulation model first order autoregressive through the design of a number of simulation experiments and the different sizes of the samples.
The current research aims to build a training program for chemistry teachers based on the knowledge economy and its impact on the productive thinking of their students. To achieve the objectives of the research, the following hypothesis was formulated:
There is no statistically significant difference at (0.05) level of significance between the average grades of the students participating in the training program according to the knowledge economy and the average grades of the students who did not participate in the training program in the test of productive thinking. The study sample consisted of (288) second intermediate grade students divided into (152) for the control group
... Show Moreيعد علم التدريب الرياضي الحديث عملية تربوية علمية مبنية على اسس صحيحة هدفها وصول اللاعبين الى التكامل في الاداء الفني وهذا يتم عن طريق التأثير المنظم والدقيق بواسطة استعمال التمارين البدنية التي تحدث تغيرات خاصة في عمل اعضاء واجهزة جسم الرياضي والتي بدورها تؤدي الى رفع كفاءة الاعضاء والاجهزة لتحقيق الانجازات الرياضية العالية ولقد استعملت الباحثتان اسلوب حديث من اساليب التدريب الرياضي من اجل تطوير تحم
... Show Moreتحتل أدوات السياسة المالية (الإنفاقية والإيرادية) مكانة مهمة بين أدوات السياسات الاقتصادية الأخرى لما تتمتع به من تأثيرات اقتصادية واجتماعية على مجمل النشاط الاقتصادي .
وفي بحثنا هذا سنركز على الآثار الاجتماعية لأدوات السياسة المالية (الإنفاق العام والإيراد العام) لما للتنمية الاجتماعية من أهمية متزايدة في عالمنا اليوم خاصة فيما يتعلق بمقوماتها غير المادية المتمثلة في خدما
... Show MoreRecommender Systems are tools to understand the huge amount of data available in the internet world. Collaborative filtering (CF) is one of the most knowledge discovery methods used positively in recommendation system. Memory collaborative filtering emphasizes on using facts about present users to predict new things for the target user. Similarity measures are the core operations in collaborative filtering and the prediction accuracy is mostly dependent on similarity calculations. In this study, a combination of weighted parameters and traditional similarity measures are conducted to calculate relationship among users over Movie Lens data set rating matrix. The advantages and disadvantages of each measure are spotted. From the study, a n
... Show MorePredicting the visibility of the lunar crescent drew great attention during the Middle Ages, especially among Muslims, because the dates of religious practices in Islam and calendars, in addition to being aware of the motion of the moon in its orbit, are based on the lunar month.
This paper aims to study the development of crescent visibility criteria from ancient times through the medieval period to the modern update. Some basics and astronomical terms related to crescent visibility are presented and then a comprehensive view of crescent visibility criteria is examined by surveying about 54 published research papers related to the issue of crescent visibility. Each research paper is summarized, classified, and the re
... Show More