Preferred Language
Articles
/
bsj-8361
Proposed Hybrid Cryptosystems Based on Modifications of Playfair Cipher and RSA Cryptosystem
...Show More Authors

Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared RSA to get the final cipher text. This algorithm achieved higher security to data but suffers from a long computational time. So Chinese remainder theorem has been used in the second hybrid cryptosystem to obtain less encryption and decryption time. The simulation results indicated that using the modified Playfair with the proposed square RSA has improved security. Moreover, using the Chinese remainder theorem achieved less encryption and decryption time in comparison to our first proposed and the standard algorithms.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jul 01 2015
Journal Name
Political Sciences Journal
Article The reality of the settlements in the occupied West Bank, and its impact on the future of the Palestinian state
...Show More Authors

الخلاصة

تتناول هذه الورقة مخططات وسياسات الاستيطان في الضفة الغربية والقدس الشرقية منذ العام 1967، عبر سياسات قادها حزب العمل وأكملها حزب الليكود وكاديما وبقية الأحزاب الإسرائيلية، تلك السياسات التي استهدفت فرض السيطرة السياسية الكاملة على الأرض، وما نتج عن ذلك من سيطرة حصرية على الأرضوتقييد استخداماتها، ومحاصرة الوجود الفلسطيني والتضييق عليه، وتحويل مراكز ال

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Auditing the technical reserves of the aircraft body insurance branch and its reflection on the fairness of the financial statements : applied research in the National Insurance Company
...Show More Authors

The research gained its importance from the importance of technical reserves in the insurance activity and its impact on the result of the activity of insurance companies and their financial position and thus reflected on the insurance prices as the technical reserves are one of the most important and most valuable budget items usually, as well as that the insurance activity has a role in maintaining economic development where some countries develop laws and instructions for the formation of those reserves binding application to insurance companies and the fact that the financial statements in general are of interest to shareholders, banks, the General Tax Authority and other beneficiaries In the insurance activity as policyholders and t

... Show More
View Publication Preview PDF
Publication Date
Thu Sep 29 2022
Journal Name
World Journal Of Clinical Infectious Diseases
Five-year retrospective hospital-based study on epidemiological data regarding human leishmaniasis in West Kordofan state, Sudan
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
2nd International Conference For Engineering Sciences And Information Technology (esit 2022): Esit2022 Conference Proceedings
Room temperature flexible sensor based on F-MWCNT modified by polypyrrole conductive polymer for NO2 gas detection
...Show More Authors

This project sought to fabricate a flexible gas sensor based on a short functionalized multi-walled carbon nanotubes (f-MWCNTs) network for nitrogen dioxide gas detection. The network was prepared by filtration from the suspension (FFS) method and modified by coating with a layer of polypyrrole conductive polymer (PPy) prepared by the oxidative chemical polymerization to improve the properties of the network. The structural, optical, and morphological properties of the f-MWCNTs and f-MWCNTs/PPy network were studied using X-ray diffraction (XRD), Fourie-transform infrared (FTIR), with an AFM (atomic force microscopy). XRD proved that the structure of f-MWCNTs is unaffected by the synthesis procedure. The FTIR spectra verified the existence o

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Tue Dec 29 2020
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Medication Safety in Patients under 18 Years Old; a Retrospective Study based on Iraqi Pharmacovigilance Center Database
...Show More Authors

Medication safety is an important part of the comprehensive patient safety term. Medication safety is gaining more attention as the World Health Organization set the goal of decreasing medication harm by (50%) for the next 5 years when launching the third global challenge. Studying medication safety in the risk groups such as young ages, children are crucial to learn more about the effect of medicines in this risk group since they are not included in the clinical trials. Adverse drug reaction is defined as any harm resulted from the drug itself during medical process journey, while medication errors are any harm resulted from the treatment process rather than the drug or it is the result of the failure in a step of the treatment process

... Show More
View Publication Preview PDF
Crossref (1)
Scopus Crossref
Publication Date
Wed Jun 10 2009
Journal Name
Iraqi Journal Of Laser
Real Time Quantum Bit Error Rate Performance Test for a Quantum Cryptography System Based on BB84 protocol
...Show More Authors

In this work, the performance of the receiver in a quantum cryptography system based on BB84 protocol is scaled by calculating the Quantum Bit Error Rate (QBER) of the receiver. To apply this performance test, an optical setup was arranged and a circuit was designed and implemented to calculate the QBER. This electronic circuit is used to calculate the number of counts per second generated by the avalanche photodiodes set in the receiver. The calculated counts per second are used to calculate the QBER for the receiver that gives an indication for the performance of the receiver. Minimum QBER, 6%, was obtained with avalanche photodiode excess voltage equals to 2V and laser diode power of 3.16 nW at avalanche photodiode temperature of -10

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
International Journal Of Neutrosophic Science
A New Paradigm for Decision Making under Uncertainty in Signature Forensics Applications based on Neutrosophic Rule Engine
...Show More Authors

One of the most popular and legally recognized behavioral biometrics is the individual's signature, which is used for verification and identification in many different industries, including business, law, and finance. The purpose of the signature verification method is to distinguish genuine from forged signatures, a task complicated by cultural and personal variances. Analysis, comparison, and evaluation of handwriting features are performed in forensic handwriting analysis to establish whether or not the writing was produced by a known writer. In contrast to other languages, Arabic makes use of diacritics, ligatures, and overlaps that are unique to it. Due to the absence of dynamic information in the writing of Arabic signatures,

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Crossref
Publication Date
Sun Feb 02 2025
Journal Name
Engineering, Technology & Applied Science Research
An Enhanced Document Source Identification System for Printer Forensic Applications based on the Boosted Quantum KNN Classifier
...Show More Authors

Document source identification in printer forensics involves determining the origin of a printed document based on characteristics such as the printer model, serial number, defects, or unique printing artifacts. This process is crucial in forensic investigations, particularly in cases involving counterfeit documents or unauthorized printing. However, consistent pattern identification across various printer types remains challenging, especially when efforts are made to alter printer-generated artifacts. Machine learning models are often used in these tasks, but selecting discriminative features while minimizing noise is essential. Traditional KNN classifiers require a careful selection of distance metrics to capture relevant printing

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Tue Oct 01 2013
Journal Name
Radioelectronics And Communications Systems
BER performance enhancement for secure wireless communication systems based on DCSK-MIMO techniques under Rayleigh fading channel
...Show More Authors

There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. As more and more information is transacted over wireless media, there has been increasing criminal activity directed against such systems. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. We have studied the performance of differential chaos shift keying (DCSK) with 2×2 Alamouti scheme and 2×1 Alamouti scheme for different chaotic maps over additive white Gaussian noise (

... Show More
View Publication
Crossref (1)
Scopus Crossref
Publication Date
Mon Dec 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
A comparative study of stylistic kriging and Co - kriging Multivariate on the barley crop in Iraq
...Show More Authors

  This paper deals  the prediction of the process of  random spatial data of two properties, the first is called  Primary variables  and the second is called secondary  variables ,   the method  that were used in the  prediction process for this type  of data is technique Co-kriging  , the method is usually used when the number of primary variables  meant to predict for one of its elements is measured in a particular location a few (because of the cost or difficulty of obtaining them) compare with secondary variable which is the number of elements  are available and  highly correlated with primary variables, as was the&nbs

... Show More
View Publication Preview PDF
Crossref