Symmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a randomly predefined set of key numbers of size n via the Donald E. Knuths SRNG algorithm (subtractive method). The second phase uses the output key (or seed value) from the previous phase as input to the Latin square matrix (LSM) to formulate a new key randomly. To increase the complexity of the generated key, another new random key of the same length that fulfills Shannon’s principle of confusion and diffusion properties is XORed. Four test keys for each 128, 192,256,512, and 1024–bit length are used to evaluate the strength of the proposed model. The experimental results and security analyses revealed that all test keys met the statistical National Institute of Standards (NIST) standards and had high values for entropy values exceeding 0.98. The key length of the proposed model for n bits is 25*n, which is large enough to overcome brute-force attacks. Moreover, the generated keys are very sensitive to initial values, which increases the complexity against different attacks.
The Life Cycle and Larval Development of Neoechinorhynchus iraqensis (Acanthocephala: Neoechinorhynchidae) in the Intermediate Host
For the first time, the life cycle of Neoechinorhynchus iraqensis, a parasite of Liza abu and other freshwater fishes in Iraq and its larval development in the intermediate host, the copepod Cyclops hyalinus was given. Hatching took place in the intestine of the copepod host within 10 minutes of exposure to the infective eggs. Motile acanthor penetrated the wall of the intestine within 2-4 hr. after exposure and was found free in the hemocoel where it metamorphoses through the acanthella stage. Acanthella stage revealed changes in the entoblast where the anterior section gave rise to brain, proboscis and proboscis receptacle. The posterior section differentiation gave rise to the genital system. By 12 days, development in the copep
... Show MoreThe Barremain-Aptian succession represented by two types of deposits, Clasits deposits of Zubair Formation. This formation is the most significant sandstone reservoir in Iraq, Deposited in fluvio- deltaic, deltaic and marine environments during the Barremain to Early Aptian age.
The area of study is located in the Mesopotamian Zone at S
The Barremain-Aptian succession represented by the Clasits deposits of Zubair Formation. This formation is the most significant sandstone reservoir in Iraq which deposited in fluvio- deltaic, deltaic and marine environments during the Barremain to Early Aptian age. The area of study is located in the Mesopotamian Zone at Southern part of Iraq which represented by five oil fields (Nasira, L
... Show MoreThe present study is focused upon the sedimentology and basin development of the Jeribe and Fatha Formations by using the field observations and microfacies analysis. The area of study situated in the Zurbatiyah area to the south of the Shur sharin valley about 21 km northeast of Badrah city to the southeast of Baghdad. This area lies within the Zagros foreland basin, and located between the Zagros mountains at the northeastern and the Arabian shield at the southeastern.
The studied succession which including the Jeribe and Fatha Formations were deposited within four associated facies for the Jeribe Formation and three for the Fatha Formation, as shown below: -
Jeribe Formation
... Show MoreThe study seeks to analyze the perceptions of audience in UAE towards the performance of Emirates Satellite TV Channels. It analyzed the exposure motivations of audience to satellite TV channels, its positive and negative aspects and to what extent they abide by media ethics. A survey is conducted with a sample of four hundred. The study shows significant differences between male and female towards the characteristics of TV channels, its positive and negative aspects and its commitments to media ethics.
The study also shows that the expectancy value model and third person effect model are applicable in studying the perceptions of audience and media people in UAE t
... Show MoreMost systems are intelligent and the industrial world is moving now towards
technology. Most industrial systems are now computerized and offer a high speed.
However, Face recognition is a biometric system that can identify people from their
faces. For few number of people to be identified, it can be considered as a fast
system. When the number of people grew to be bigger, the system cannot be adopted
in a real-time application because its speed will degrade along with its accuracy.
However, the accuracy can be enhanced using pre-processing techniques but the
time delay is still a challenge. A series of experiments had been done on AT&TORL
database images using Enhanced Face Recognition System (EFRS) that is
The nuclear charge density distributions, form factors and
corresponding proton, charge, neutron, and matter root mean square
radii for stable 4He, 12C, and 16O nuclei have been calculated using
single-particle radial wave functions of Woods-Saxon potential and
harmonic-oscillator potential for comparison. The calculations for the
ground charge density distributions using the Woods-Saxon potential
show good agreement with experimental data for 4He nucleus while
the results for 12C and 16O nuclei are better in harmonic-oscillator
potential. The calculated elastic charge form factors in Woods-Saxon
potential are better than the results of harmonic-oscillator potential.
Finally, the calculated root mean square
In this article we study a single stochastic process model for the evaluate the assets pricing and stock.,On of the models le'vy . depending on the so –called Brownian subordinate as it has been depending on the so-called Normal Inverse Gaussian (NIG). this article aims as the estimate that the parameters of his model using my way (MME,MLE) and then employ those estimate of the parameters is the study of stock returns and evaluate asset pricing for both the united Bank and Bank of North which their data were taken from the Iraq stock Exchange.
which showed the results to a preference MLE on MME based on the standard of comparison the average square e
... Show MoreBackground: Enforcement of sustainable and green chemistry protocols has seen colossal surge in recent times, the development of an effective, eco-friendly, simple and novel methodologies towards the synthesis of valuable synthetic scaffolds and drug intermediates. Recent advances in technology have now a more efficient means of heating reactions that made microwave energy. Efforts to synthesize novel heterocyclic molecules of biological importance are in continuation. Microwave irradiation is well known to promote the synthesis of a variety of organic and inorganic compounds. The aim of current study was to conceivea mild base mediated preparation of novel Schiff base of 2-Acetylpheno with trimethoprim drug (H2TPBD) and its complexes w
... Show MoreInformation centric networking (ICN) is the next generation of internet architecture with its ability to provide in-network caching that make users retrieve their data efficiently regardless of their location. In ICN, security is applied to data itself rather than communication channels or devices. In-network caches are vulnerable to many types of attacks, such as cache poisoning attacks, cache privacy attacks, and cache pollution attacks (CPA). An attacker floods non-popular content to the network and makes the caches evict popular ones. As a result, the cache hit ratio for legitimate users will suffer from a performance degradation and an increase in the content’s retrieval latency. In this paper, a popularity variation me
... Show More