Symmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a randomly predefined set of key numbers of size n via the Donald E. Knuths SRNG algorithm (subtractive method). The second phase uses the output key (or seed value) from the previous phase as input to the Latin square matrix (LSM) to formulate a new key randomly. To increase the complexity of the generated key, another new random key of the same length that fulfills Shannon’s principle of confusion and diffusion properties is XORed. Four test keys for each 128, 192,256,512, and 1024–bit length are used to evaluate the strength of the proposed model. The experimental results and security analyses revealed that all test keys met the statistical National Institute of Standards (NIST) standards and had high values for entropy values exceeding 0.98. The key length of the proposed model for n bits is 25*n, which is large enough to overcome brute-force attacks. Moreover, the generated keys are very sensitive to initial values, which increases the complexity against different attacks.
In this paper a prey - predator model with harvesting on predator species with infectious disease in prey population only has been proposed and analyzed. Further, in this model, Holling type-IV functional response for the predation of susceptible prey and Lotka-Volterra functional response for the predation of infected prey as well as linear incidence rate for describing the transition of disease are used. Our aim is to study the effect of harvesting and disease on the dynamics of this model.
Purpose: clarify the integrative relationship of strategic leadership skills and effective management and the role of those skills combined or individually in achieving effective management.
Research design: The researchers used the quantitative method by surveying a class sample from the heads of the executive departments in a group of Iraqi private banks, consisting of (106) individuals according to the (VUCA Prime) methodology for effective management and the ten skills model for Johansen. The questionnaire was analyzed using a model of the structural equation.
Findings: The most prominent results of the research were the presence of a weak ro
... Show MoreThis paper studies a novel technique based on the use of two effective methods like modified Laplace- variational method (MLVIM) and a new Variational method (MVIM)to solve PDEs with variable coefficients. The current modification for the (MLVIM) is based on coupling of the Variational method (VIM) and Laplace- method (LT). In our proposal there is no need to calculate Lagrange multiplier. We applied Laplace method to the problem .Furthermore, the nonlinear terms for this problem is solved using homotopy method (HPM). Some examples are taken to compare results between two methods and to verify the reliability of our present methods.
AA Abbass, HL Hussein, WA Shukur, J Kaabi, R Tornai, Webology, 2022 Individual’s eye recognition is an important issue in applications such as security systems, credit card control and guilty identification. Using video images cause to destroy the limitation of fixed images and to be able to receive users’ image under any condition as well as doing the eye recognition. There are some challenges in these systems; changes of individual gestures, changes of light, face coverage, low quality of video images and changes of personal characteristics in each frame. There is a need for two phases in order to do the eye recognition using images; revelation and eye recognition which will use in the security systems to identify the persons. The mai
... Show MoreThe studied succession is deposited during late Berriasian-Aptian interval, which is represented by the Zubair, Ratawi, Yamama formations. The present study includes stratigraphic development and basin analysis for 21 boreholes (Rachi-1, 2; Rifaei-1, Diwan- 1; Ratawi-1, 2; Halfaia-5; West Qurna 12, 15; Nahr Umr-7,8; Zubair-47,49; North Rumaila- 72, 131, 158; Suba-7; Majnoon-2, 3 and Luhais-2, 12) distributed within 13 oil fields in the southern Iraq. The back-stripping process determined the original direction of basin depocenter for the studied succession. The Yamama basin in the study area stretches from southeast to southwest with single depocenters, it was located in the southeast of the study area near wells Mj-2, Mj-3.NR-8 and
... Show MoreFollowing the political development in Iraq Since 7112 exposed kind of political traditions about how to manage the conflicts that have different Iraqi powers .That what was clear since the formation of permanent government since in 7112 .
The case of conflict between political powers in administrating Iraq state and the withdrawal of American Forcesintroduces questions:
0-Is it possible that that the beginning of Iraq state building shall ease this conflict and peacemaking in the post-conflict period?
7- To what extent the Iraqi powerswas to manage their disputes in non-military like elections which was held in 7112?
2- What is the range of the extent of the political operation after the American withdrawal?
The important