Email is one of the most commonly utilized communication methods. The confidentiality, the integrity and the authenticity are always substantial in communication of the e-mail, mostly in the business utilize. However, these security goals can be ensured only when the cryptography is utilized. Cryptography is a procedure of changing unique data into a configuration with the end goal that it is just perused by the coveted beneficiary. It is utilized to shield data from other individuals for security purposes. Cryptography algorithms can be classified as symmetric and asymmetric methods. Symmetric methods can be classified as stream cipher and block cipher. There are different operation modes provided by the block cipher, these are Cipher Block Chaining (CBC), Output Feedback (OFB), Cipher Feedback (CFB) and Electronic Code Block (ECB). CBC used to complex the cryptographic systems, by using Initialization Vector (IV), Xoring, and encryption with specified key over chain of blocks, but CBC is vulnerable to chosen plaintext attack because the IV is static and vulnerable to chosen ciphertext attack because the encryption method with the key are static. This paper introduce a proposed E-mail messages encryption systems , the proposal based on modified CBC mode operation hybrid with some of techniques exploited in the encryption such as RADG, DNA, RNA and a suggested permutation methods. The proposed modifications applied on the CBC are generate IV randomly, generate key randomly, and propose encryption method, these modifications proposed to avoid the attacks that CBC is vulnerable to.
Background:
type 2 diabetes mellitus is a chronic disease that is accompanied by the production of free radicals which will ultimately increase the level of oxidative stress.
At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena
... Show MoreData compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p
... Show MoreThere are many tools and S/W systems to generate finite state automata, FSA, due to its importance in modeling and simulation and its wide variety of applications. However, no appropriate tool that can generate finite state automata, FSA, for DNA motif template due to the huge size of the motif template. In addition to the optional paths in the motif structure which are represented by the gap. These reasons lead to the unavailability of the specifications of the automata to be generated. This absence of specifications makes the generating process very difficult. This paper presents a novel algorithm to construct FSAs for DNA motif templates. This research is the first research presents the problem of generating FSAs for DNA motif temp
... Show MoreThe aim of this study to determine the genetic distance and relationship among some Iraqi date palm cultivars by using the Random Amplified Polymorphic DNA (RAPD) technique. Molecular analysis was performed by using 10 random primers. These primers produced 176 fragment lines across 14 cultivars, Of these, 166 or 94.3% were polymorphic. The size of the amplified bands ranged between 200-2250 bp. The genetic polymorphism value of each primer was determined and ranged between 7.5-16.9%. In terms of unique banding patterns, the most characteristic banding pattern was for the Barhee cultivar with primer OP-M06 and for the Khadhrawy Mandily cultivar with primer OP-C02. Genetic distance values ranged from 0.868 to 0.125 among studied date palm
... Show MoreIntrusion-detection systems (IDSs) aim at detecting attacks against computer systems and networks or, in general, against information systems. Most of the diseases in human body are discovered through Deoxyribonucleic Acid (DNA) investigations. In this paper, the DNA sequence is utilized for intrusion detection by proposing an approach to detect attacks in network. The proposed approach is a misuse intrusion detection that consists of three stages. First, a DNA sequence for a network traffic taken from Knowledge Discovery and Data mining (KDD Cup 99) is generated. Then, Teiresias algorithm, which is used to detect sequences in human DNA and assist researchers in decoding the human genome, is used to discover the Shortest Tandem Repeat (S
... Show MoreBackground: A quick and easy method was developed for extraction of DNA of eukaryotes from different samples, which are bone marrow and sperms in white mice Mus musculus strain (Balb/c).
Patients and Methods: this method using high salt buffer, Ethylene diemine tetracetec acid (EDTA), Trypsine,Sodium Dodecyl Sulfate(SDS), and urea without using Proteinase-K digestion or ultracentrifugation.
Results: This method was successful in extracting DNA from different samples in eukaryotic and this DNA is suitable for Hind III digestion.
Conclusion: Without further clean-up, the extracted DNA can be used for restriction endonuclease digestion or for numerous applications.
Phenotypic And genotypic characteristics of Salmonella enterica serotype Typhi have been determined for 29 isolates, from Baghdad in 2007. Conventional typing methods were performed by biochemical tests, and antimicrobial susceptibility test. Molecular typing performed by analysis plasmid DNA beside using the Random Amplified Polymorphic DNA (RAPD-PCR). For the latter, two universal primers that have selected for the high discriminatory power were used for RAPD analysis. All isolates were belong one biotype according to the differention by their ability to decarboxylat lysine, 29(100%) were lysine (+). All the isolates were susceptible to the Antibiotics used. However, all the strains free of plasmids. RAPD was capable of grouping the strai
... Show MoreThe aim of this study to determine the genetic distance and relationship among some Iraqi date palm cultivars by using the Random Amplified Polymorphic DNA (RAPD) technique. Molecular analysis was performed by using 10 random primers. These primers produced 176 fragment lines across 14 cultivars, Of these, 166 or 94.3% were polymorphic. The size of the amplified bands ranged between 200-2250 bp. The genetic polymorphism value of each primer was determined and ranged between 7.5-16.9%. In terms of unique banding patterns, the most characteristic banding pattern was for the Barhee cultivar with primer OP-M06 and for the Khadhrawy Mandily cultivar with primer OP-C02. Genetic distance values ranged from 0.868 to 0.125 among studied date palm
... Show More