The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key is decreased about 66%. On the other hand, the distance is decreased less than 1% when the multiplier is larger than 66. Therefore, to avoid attacking by using the proposed method, the multiplier which is larger than 66 should be chosen. Furthermore, it is shown that if the public key equals 3, the multiplier always equals 2.
يمثل ابن الجزري احد علمائنا الذين كان لهم دور في التطور الثقافي والحضاري الذي شهده العالم الإسلامي آنذاك، ويعد كتابه هذا منهلا غزيرا لطلاب العلم لدراسته من النواحي كافة، وتشكل الإجازات إحدى حلقات الوصل في تراجمه ولها أهميتها من الناحية المنهجية ولها دور كبير في رفد كتابه هذا بكثير من الموارد التي لها أساسها احتوت على مادة كتبت بخط المجيز كان لها أثرها في دعم منهجية الكتاب،والمادة التي تشعبت في ضوء هذا الات
... Show MoreFrom this research ,it can be concluded that Ibn al-Jawzi touch on the subject of dreams , dignities and paranormal part of his curriculum, which he ontinued on his book, as it is an important part of the elements of translation, we find first special attention and promise of things recognized when responding with them in most of the cases in which they received, including proximity He pointed out to an important point through dreams, dignities.
In this study, iron was coupled with copper to form a bimetallic compound through a biosynthetic method, which was then used as a catalyst in the Fenton-like processes for removing direct Blue 15 dye (DB15) from aqueous solution. Characterization techniques were applied on the resultant nanoparticles such as SEM, BET, EDAX, FT-IR, XRD, and zeta potential. Specifically, the rounded and shaped as spherical nanoparticles were found for green synthesized iron/copper nanoparticles (G-Fe/Cu NPs) with the size ranging from 32-59 nm, and the surface area was 4.452 m2/g. The effect of different experimental factors was studied in both batch and continuous experiments. These factors were H2O2 concentration, G-Fe/CuNPs amount, pH, initial DB15
... Show MoreContinuous turbidimetric analysis (CTA) for a distinctive analytical application by employing a homemade analyser (NAG Dual & Solo 0-180°) which contained two consecutive detection zones (measuring cells 1 & 2) is described. The analyser works based on light-emitting diodes as a light source and a set of solar cells as a light detector for turbidity measurements without needing further fibres or lenses. Formation of a turbid precipitated product with yellow colour due to the reaction between the warfarin and the precipitation reagent (Potassium dichromate) is what the developed method is based on. The CTA method was applied to determine the warfarin in pure form and pharmaceu
Continuous turbidimetric analysis (CTA) for a distinctive analytical application by employing a homemade analyser (NAG Dual & Solo 0-180°) which contained two consecutive detection zones (measuring cells 1 & 2) is described. The analyser works based on light-emitting diodes as a light source and a set of solar cells as a light detector for turbidity measurements without needing further fibres or lenses. Formation of a turbid precipitated product with yellow colour due to the reaction between the warfarin and the precipitation reagent (Potassium dichromate) is what the developed method is based on. The CTA method was applied to determine the warfarin in pure form and pharmaceu
The interest in the issue of capital movement as an economic phenomenon has increased because of its effects and effects and its ability to influence the economic balance and the effectiveness of monetary policy. All countries seek to attract capital and benefit from it because of its effects and results such as supporting economic development process and optimal allocation of economic resources. The problem of the financing gap that most countries suffer from, and others, but sometimes the movement of capital creates challenges for monetary policy makers in achieving their goals.
After 2003, the Iraqi economy witnessed an openness and economic liberalization unlike previous years, which
... Show MoreBiodiesel production from microalgae depends on the biomass and lipid production. Both biomass and lipid accumulation is controlled by several factors. The effect of various culture media (BG11, BBM, and Urea), nutrients stress [nitrogen (N), phosphorous (P), magnesium (Mg) and carbonate (CO3)] and gamma (γ) radiation on the growth and lipid accumulation of Dictyochloropsis splendida were investigated. The highest biomass and lipid yield of D. splendida were achieved on BG11 medium. Cultivation of D. splendida in a medium containing 3000 mg L−1 N, or 160 mg L−1 P, or 113 mg L−1 Mg, or 20 mg L-1 CO3, led to enhanced growth rate. While u
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreImage fusion is one of the most important techniques in digital image processing, includes the development of software to make the integration of multiple sets of data for the same location; It is one of the new fields adopted in solve the problems of the digital image, and produce high-quality images contains on more information for the purposes of interpretation, classification, segmentation and compression, etc. In this research, there is a solution of problems faced by different digital images such as multi focus images through a simulation process using the camera to the work of the fuse of various digital images based on previously adopted fusion techniques such as arithmetic techniques (BT, CNT and MLT), statistical techniques (LMM,
... Show More