Preferred Language
Articles
/
bsj-8361
Proposed Hybrid Cryptosystems Based on Modifications of Playfair Cipher and RSA Cryptosystem
...Show More Authors

Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared RSA to get the final cipher text. This algorithm achieved higher security to data but suffers from a long computational time. So Chinese remainder theorem has been used in the second hybrid cryptosystem to obtain less encryption and decryption time. The simulation results indicated that using the modified Playfair with the proposed square RSA has improved security. Moreover, using the Chinese remainder theorem achieved less encryption and decryption time in comparison to our first proposed and the standard algorithms.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Aug 31 2019
Journal Name
Iraqi Journal Of Physics
Investigation the effect of post deposition thermal treatment on properties P3HT and P3HT:PCBM blend.
...Show More Authors

  This work reports the study of heat treatment effect on the structural, morphological, optical and electrical properties of poly [3-hexylthiophene] and its blend with [6,6]-phenyl C61 butyric acid methyl ester ( P3HT:PC61BM). X-ray diffraction (XRD) measurements show that the crystallinity of the films increased with annealing. The evaluation of surface roughness and morphology was investigated using atomic force microscope (AFM), and field emission scanning microscope(FESEM). The optical properties were emphasized a strong optical absorption of P3HT compared with the blend. Hall effect measurement was used to study the electrical properties which revealed there is an increase in the electrical conductivity and Hall mobility of th

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri May 25 2018
Journal Name
Open Public Health Journal
Comparative Study on the Clinicopathological Profiles of Breast Cancer Among Iraqi and British Patients
...Show More Authors

Background: Breast cancer is the most common cancer in Iraq and the United Kingdom. While the disease is frequently diagnosed among middleaged Iraqi women at advanced stages accounting for the second cause of cancer-related deaths, breast cancer often affects elderly British women yielding the highest survival of all registered malignancies in the UK. Objective: To compare the clinical and pathological profiles of breast cancer among Iraqi and British women; correlating age at diagnosis with the tumor characteristics, receptor-defined biomarkers and phenotype patterns. Methods: This comparative retrospective study included the clinical and pathological characteristics of (1,940) consecutive female patients who were diagnosed with invasive b

... Show More
View Publication Preview PDF
Scopus (34)
Crossref (15)
Scopus Crossref
Publication Date
Sun Aug 11 2024
Journal Name
Lecture Notes In Networks And Systems
International Financial Reporting Standards and Their Impact on the Value of the Economic Unit
...Show More Authors

This study examines the impact of adopting International Financial Reporting Standards (IFRS) on the value of economic units. Given the global push toward standardization of financial reporting to enhance financial statement transparency, comparability, and reliability, this research seeks to understand the implications of these standards for economic valuation within a region characterized by its unique economic and regulatory challenges. A questionnaire was distributed to 86 Iraqi academics specializing in economics, accounting, and finance to collect their views on the impact of adopting international financial reporting standards. Through careful statistical analysis, the study concluded that applying international financial reporting s

... Show More
View Publication
Scopus (3)
Crossref (5)
Scopus Crossref
Publication Date
Thu Aug 22 2019
Journal Name
Separation Science And Technology
Modification of Langmuir model for simulating initial pH and temperature effects on sorption process
...Show More Authors

Scopus (45)
Crossref (31)
Scopus Clarivate Crossref
Publication Date
Mon Nov 06 2023
Journal Name
Chemical And Process Engineering
Relative wettability measurement of porous diffuser and its impact on the generated bubble size
...Show More Authors

View Publication
Scopus (4)
Scopus Clarivate Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (5)
Scopus Crossref
Publication Date
Fri Sep 30 2022
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Ijarah and lease ending with ownership and its implications for the bank's profits: A case study in the Emirates Islamic Bank and Emirates NBD
...Show More Authors

The formula of Ijarah and Ijarah ending with ownership is one of the investment formulas in Islamic banks, so this research has shed light on it in order to benefit from the experiences of the research sample banks, This research aims to find a reliable way for Iraqi Islamic banks, namely (leasing and leasing ending with ownership) in order to invest their money without usurious interests, The problem of the research emerges through the lack of awareness of the Iraqi Islamic banks to work with different Islamic financing formulas and their inability to invest their money through the adoption of their administrations for different formulas, including the leasing, and this is reflected in the decrease and fluctuation of its profits, Theref

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Sat Feb 01 2014
Journal Name
Journal Of Economics And Administrative Sciences –jeas
Analaysis of the lmpacyt fiscal policy in Iraq on stabilization and economic growth for the period (2003-2010)
...Show More Authors

The vision and philosophy of the economic system in Iraq after 2003 were not clear-cut because of overlapping internal factors was the novelty of the political system and the lack of political and economic decision makers to understanding and conviction full need shaping a new administration for the Iraqi economy is able to succeed economic development programs, and external factors was determinedly organizations international application of shock reforming style and contrary to the social reality and the security which reflected negatively on the work and consistency Lisseeash financial balance between stability and growth and raise the level of consumer spending and the importance of research lies in the ability of fiscal policy to achie

... Show More