The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key is decreased about 66%. On the other hand, the distance is decreased less than 1% when the multiplier is larger than 66. Therefore, to avoid attacking by using the proposed method, the multiplier which is larger than 66 should be chosen. Furthermore, it is shown that if the public key equals 3, the multiplier always equals 2.
In this paper, magnesium oxide nanoparticles (MgO NPS) have been prepared and characterized and its concentration effect has been studied on polymers surface (MgO NPS). The results showed that the degradation of poly methyl methacrylate increased when using such metal oxide. The results also showed that the metal oxide increased the degradation of poly methyl methacrylate. X-ray diffraction, scanning electron microscopy, atomic force microscopy were used to study the morphological characteristics and size of nano MgO particles analysis. Films were prepared by mixing the different masses of MgO NPS (0.025, 0.05, 0.1, 0.2 and 0.4) % with a polymer solution ratio (W/V) 7 %. Photo-
... Show MoreAbstract
The current research aims to identify the attitudes towards the Covid-19 vaccine and the Locus of Control (internal, external) among university students, to identify the significance of the difference in attitudes towards the Covid-19 vaccine, the significance of the difference in the Locus of Control (internal, external) according to the gender variable (male, female), and to identify the significance of the difference in students’ attitudes towards Covid-19 vaccine according to the Locus of Control (internal, external). To achieve the objective of the research, the researcher developed two scales, a scale of (20) items to identify the attitudes toward a covid-19 vaccine, and a scale of the locus of c
... Show MoreThe research aims to highlight on the behavioural approach in accounting, and clarify the behavioural implications of the main activities of accounting, and clarify the concept of information inductance within the framework of the behavioural approach and its impact on preparing financial statements. And that the impact of financial information on the behaviour of investment decision-makers, and to achieve the goals of the research, the researcher prepared a questionnaire according to Likert five-step scale, and he took into consideration in preparing it in line with the characteristics of the study community, and that the target community for this questionnaire is the investors in the Iraq Stock Exchange. The researcher reached
... Show MoreThe study aimed to determine the impact of energy for the north and south magnetic poles on the the growth of bacteria isolated from cases of tooth decay, 68 swabs were collected from surfaces of faulty tooth, the detected of Staphylococcus aureus
... Show MoreTitanium dioxide nanoparticles (TiO2 NPs) are generally used in different types of applications such as the industry of plastics, paper industry, paints, toothpaste, cosmetics, sunscreens, and in various lifestyles, because of the vast range of applications and our daily exposure to these nanoparticles and a lack of information on animal and human health this study was designed to reveal dose and time-dependent effects of TiO2-NPs on the thyroid gland and kidney functions in male rats.
For this study 54, Sprague-Dawley albino adult male rats were classified into three main groups each of 18 rats treated for a particular duration (1,2, and 4) weeks respectively. Each group was subdivided i
... Show MoreMetal oxide nanoparticles demonstrate uniqueness in various technical applications due to their suitable physiochemical properties. In particular, yttrium oxide nanoparticle(Y2O3NPs) is familiar for technical applications because of its higher dielectric constant and thermal stability. It is widely used as a host material for a variety of rare-earth dopants, biological imaging, and photodynamic therapies. In this investigation, yttrium oxide nanoparticles (Y2O3NPs) was used as an ecofriendly corrosion inhibitor through the use of scanning electron microscopy (SEM), Fourier transforms infrared spectroscopy (FT-IR), UV-Visible spectroscopy, X-ray diffraction (XRD), and energy dispersive X-ray spe
... Show MoreCryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show MoreToday with increase using social media, a lot of researchers have interested in topic extraction from Twitter. Twitter is an unstructured short text and messy that it is critical to find topics from tweets. While topic modeling algorithms such as Latent Semantic Analysis (LSA) and Latent Dirichlet Allocation (LDA) are originally designed to derive topics from large documents such as articles, and books. They are often less efficient when applied to short text content like Twitter. Luckily, Twitter has many features that represent the interaction between users. Tweets have rich user-generated hashtags as keywords. In this paper, we exploit the hashtags feature to improve topics learned
Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user
... Show More