Email is one of the most commonly utilized communication methods. The confidentiality, the integrity and the authenticity are always substantial in communication of the e-mail, mostly in the business utilize. However, these security goals can be ensured only when the cryptography is utilized. Cryptography is a procedure of changing unique data into a configuration with the end goal that it is just perused by the coveted beneficiary. It is utilized to shield data from other individuals for security purposes. Cryptography algorithms can be classified as symmetric and asymmetric methods. Symmetric methods can be classified as stream cipher and block cipher. There are different operation modes provided by the block cipher, these are Cipher Block Chaining (CBC), Output Feedback (OFB), Cipher Feedback (CFB) and Electronic Code Block (ECB). CBC used to complex the cryptographic systems, by using Initialization Vector (IV), Xoring, and encryption with specified key over chain of blocks, but CBC is vulnerable to chosen plaintext attack because the IV is static and vulnerable to chosen ciphertext attack because the encryption method with the key are static. This paper introduce a proposed E-mail messages encryption systems , the proposal based on modified CBC mode operation hybrid with some of techniques exploited in the encryption such as RADG, DNA, RNA and a suggested permutation methods. The proposed modifications applied on the CBC are generate IV randomly, generate key randomly, and propose encryption method, these modifications proposed to avoid the attacks that CBC is vulnerable to.
Environment suffered in recent years a large corrupting by human; and because of his ignorance of the dimensions of Caliphate in the ground and ignore what it means gearing. The gearing is that the son of Adam, which will benefit the board of Allah Almighty to him in the land of the causes of life, without exaggeration or negligence and without prejudice to the cosmic Balnoames enacted by the Almighty Creator, has urged verses of the Quran Muslim to preserve and protect the environment which is a religious duty, as it showed a great verses he is the author and the splendor and beauty of workmanship and manufacturer greatness of the Almighty, who created all things beautiful.
Koran played a major role in the consolidation of environmen
With the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of
... Show MoreThe study aims to provide a Suggested model for the application of Virtual Private Network is a tool that used to protect the transmitted data through the Web-based information system, and the research included using case study methodology in order to collect the data about the research area ( Al-Rasheed Bank) by using Visio to design and draw the diagrams of the suggested models and adopting the data that have been collected by the interviews with the bank's employees, and the research used the modulation of data in order to find solutions for the research's problem.
The importance of the study Lies in dealing with one of the vital topics at the moment, namely, how to make the information transmitted via
... Show MoreThe research acquires its importance by motivating the behavioural side of the employees to apply modern technology in the work, because of its great importance in increasing the efficiency of employees’ performance and excellence. The research was based on two main hypotheses to show the relationship and impact between the variables through the adoption of a questionnaire to collect data and information related to the research, which consisted of (50) people from administrators working at different levels, based on personal interviews and field visits to collect research data. The data collection process was subjected to statistical analysis using the statistical program (SPSS) (Statistical package for social science) to reach
... Show MoreAfter the information revolution that occurred in the Western world, and the developments in all fields, especially in the field of education and e-learning, from an integrated system based on the effective employment of information and communication technology in the teaching and learning processes through an environment rich in computer and Internet applications, the community and the learner were able to access information sources and learning at any time and place, in a way that achieves mutual interaction between the elements of the system and the surrounding environment. After the occurrence of the phenomenon of Covid 19, it led to a major interruption in all educational systems that had never happened before, and the disrupt
... Show MoreIn IRAQ, the air conditioners are the principal cause of high electrical demand. In summer, the outer temperature sometimes exceeds 500C which significantly effects on the A/C system performance and power consumed. In the present work, the improvement in mechanical and electrical performance of split A/C system is investigated experimentally and analytically. In this paper, performance and energy saving enhancement of a split-A/C system was experimentally investigated to be efficiently compatible with elevated temperature weathers. This improvement is accomplished via Smart Control System integrate with Proportional-Integral- Differential PID algorithm. The PIC16F877A micro-controller has been programmed with the PID and PWM c
... Show MoreThis paper aims to introduce the concepts of -closed, -coclosed, and -extending modules as generalizations of the closed, coclossed, and extending modules, respectively. We will prove some properties as when the image of the e*-closed submodule is also e*-closed and when the submodule of the e*-extending module is e*-extending. Under isomorphism, the e*-extending modules are closed. We will study the quotient of e*-closed and e*-extending, the direct sum of e*-closed, and the direct sum of e*-extending.