Preferred Language
Articles
/
bsj-4360
A New Methodology to Find Private Key of RSA Based on Euler Totient Function
...Show More Authors

          The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key is decreased about 66%. On the other hand, the distance is decreased less than 1% when the multiplier is larger than 66. Therefore, to avoid attacking by using the proposed method, the multiplier which is larger than 66 should be chosen. Furthermore, it is shown that if the public key equals 3, the multiplier always equals 2.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 30 2022
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
The Effect of Solvent Type on PAN–Based Nonwoven Nanofibers Membranes Characterizations
...Show More Authors

Electrospun nanofiber membranes are employed in a variety of applications due to its unique features. the nanofibers' characterizations are effected by the polymer solution. The used solvent for dissolving the polymer powder is critical in preparing the precursor solution. In this paper, the Polyacrylonitrile (PAN)-based nanofibers were prepared in a concentration of 10 wt.% using various solvents (NMP, DMF, and DMSO). The surface morphology, porosity, and the mechanical strength of the three prepared 10 wt.% PAN-based nanofibers membranes (PAN/NMP, PAN/DMF, and PAN/DMSO) were characterized using the Scanning Electron Microscopy (SEM), Dry-wet Weights method, and Dynamic Mechanical Analyzer (DMA). Using DMF as a solvent resulted in a lon

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Journal Of Engineering
Dual Stages of Speech Enhancement Algorithm Based on Super Gaussian Speech Models
...Show More Authors

Various speech enhancement Algorithms (SEA) have been developed in the last few decades. Each algorithm has its advantages and disadvantages because the speech signal is affected by environmental situations. Distortion of speech results in the loss of important features that make this signal challenging to understand. SEA aims to improve the intelligibility and quality of speech that different types of noise have degraded. In most applications, quality improvement is highly desirable as it can reduce listener fatigue, especially when the listener is exposed to high noise levels for extended periods (e.g., manufacturing). SEA reduces or suppresses the background noise to some degree, sometimes called noise suppression alg

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Wed Jun 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
Selection of the initial value of the time series generating the first-order self-regression model in simulation modeAnd their impact on the accuracy of the model
...Show More Authors

In this paper, compared eight methods for generating the initial value and the impact of these methods to estimate the parameter of a autoregressive model, as was the use of three of the most popular methods to estimate the model and the most commonly used by researchers MLL method, Barg method  and the least squares method and that using the method of simulation model  first order autoregressive through the design of a number of simulation experiments and the different sizes of the samples.

                  

View Publication Preview PDF
Crossref
Publication Date
Thu Oct 18 2018
Journal Name
Al–bahith Al–a'alami
The Pressures Affecting the Performance of Iraqi Media before the Legislative Elections of 2018 (Iraqi Satellite News Channel- as a Model): A Survey Study  Dr.Safad Husam Hammody
...Show More Authors

The modernity of election practices of the elections in Iraq, according to the democratic approach, has led to a struggle between political rival forces reflecting a deep pressure on the tools involved in the management, marketing or control of these elections across the general social level. Hence the problem of research resides in answering the following question: What is the nature and size of the pressures affecting the media performance of Al-Iraqia News channel before the legislative elections of 2018 in Iraq?
      The objectives of the research were the following:
1. to identify the nature of the pressures that limit the Al-Iraqia News channel’s perfo

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Oct 22 2018
Journal Name
Arab Science Heritage Journal
قراءة قراء الكوفة في كتاب "غاية النهاية في طبقات القراء" لابن الجزري"ت832هـ"/دراسة منهجية
...Show More Authors

               خص ابن الجزري في كتابه هذا قراء الكوفة بمجموعه كبيرة من التراجم التي قدمها وفق صياغات  منهجية منوعه اعتمدت على الأسس والضوابط التي التزم بها في تقديم تلك التراجم الخاصة بقراء الكوفة بصورة خاصة  والتراجم الأخرى بصورة عامه مشيرا إليها من خلال بعض الصياغات الفنية في الروايات، فكان يشير إلى نوع العلاقة لمترجمة مع شيوخه من خلال عرضه للرواية ولاسيما في كثرة الرو

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 10 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
Development of Robust and Efficient Symmetric Random Keys Model based on the Latin Square Matrix
...Show More Authors

Symmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sun Dec 01 2024
Journal Name
Journal Of Ecological Engineering
Enhancing the Removal of Methyl Orange Dye by Electrocoagulation System with Nickel Foam Electrode – Optimization with Surface Response Methodology
...Show More Authors

Azo dyes like methyl orange (MO) are very toxic components due to their recalcitrant properties which makes their removal from wastewater of textile industries a significant issue. The present study aimed to study their removal by utilizing aluminum and Ni foam (NiF) as anodes besides Fe foam electrodes as cathodes in an electrocoagulation (EC) system. Primary experiments were conducted using two Al anodes, two NiF anodes, or Al-NiF anodes to predict their advantages and drawbacks. It was concluded that the Al-NiF anodes were very effective in removing MO dye without long time of treatment or Ni leaching at in the case of adopting the Al-Al or NiF-NiF anodes, respectively. The structure and surface morphology of the NiF electrode were inves

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Sun Sep 03 2023
Journal Name
Iraqi Journal Of Computers, Communications, Control & Systems Engineering (ijccce)
Efficient Iris Image Recognition System Based on Machine Learning Approach
...Show More Authors

HM Al-Dabbas, RA Azeez, AE Ali, IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2023

View Publication