In this research work, some low complexity and efficient cryptanalysis approaches are proposed to decrypt password (encryption keys). Passwords are still one of the most common means of securing computer systems. Most organizations rely on password authentication systems, and therefore, it is very important for them to enforce their users to have strong passwords. They usually ignore the importance of usability of the password for the users. The more complex they are the more they frustrate users and they end up with some coping strategies such as adding “123” at the end of their passwords or repeating a word to make their passwords longer, which reduces the security of the password, and more importantly there is no scientific basis for these password creation policies to make sure that passwords that are created based on these rules are resistance against real attacks. The current research work describes different password creation policies and password checkers that try to help users create strong passwords and addresses their issues. Metrics for password strength are explored in this research and efficient approaches to calculate these metrics for password distributions are introduced. Furthermore, efficient technique to estimate password strength based on its likelihood of being cracked by an attacker is described. In addition, a tool called PAM has been developed and explained in details in this paper to help users have strong passwords using these metrics; PAM is a password analyzer and modifier.
Soils at Al-Koot-Btera were choosen to determine their sedimentary
environments. It is found that there are , five soil series and as mentioned :
MF11-MW9-DM97-DM57-DF95 . The five found soil series are of internal
well drained ,moderate and imperfect. Their textures vary in moderately,fine
and moderately fine.
indicating that sediments rang from poorly to very poorly sorting. Values of median
diameter Md Ø range between 4.11-7.80 Ø .The relation between the sorting
and median diameter shows that 95.24% of samples is a sedimentary
environment of aquite river , while 4.76% is aeolian sediments.
The values of meso to platy kurtic of most horizon materials rang
between 0.67-1.26 Ø .That is to say the samples
This investigation was conducted to examine some physical and chemical properties of sand dunes collected from Basrah (1 '2 and 3) 'Nassiriya (4 and 5) and Amara (6) provinces that situated in lower Mesopotamia plain.
The results indicate clearly that the dominant particles in the samples were sand that were ranging from (81) % to (97) %, however the aggregated size of (0.1 - 0.25) mm were predominates in the investigated sand dunes of the region . Also the study shows that the content of the organic matter and potassium ions were very low (0.1- 0.4% '0.02 -0.22 meq I 100 gm soil. Further more the current result shows high a percentage of calcium carbonate (20.3 - 42.5%). In addition, the study has found a
... Show Morel
The cost management of cost indicators in housing projects, on the level of planning and design, is the most important quality indicators, for adoption of strategies of planning and design efficient in managing these indicators. So this research points out the need to highlight the most effective and influential cost indicators in housing projects, and to determine strategies in the management of these indicators in order to raise the efficiency of housing projects quality, to seemly the income level target group, taking into consideration the quality of housing standards, to achieve the basic requirements of housing. This paper highlights the importance of the cost management, the types of housing cost, the method
... Show MoreIn this paper a new technique based on dynamic stream cipher algorithm is introduced. The mathematical model of dynamic stream cipher algorithm is based on the idea of changing the structure of the combined Linear Feedback Shift Registers (LFSR's) with each change in basic and message keys to get more complicated encryption algorithm, and this is done by use a bank of LFSR's stored in protected file and we select a collection of LFSR's randomly that are used in algorithm to generate the encryption (decryption) key.
We implement Basic Efficient Criteria on the suggested Key Generator (KG) to test the output key results. The results of applying BEC prove the robustness and efficiency of the proposed stream cipher cryptosystem.
Mobile ad hoc network is nothing but the temporary network which is having the collection of mobile nodes. Routing and broadcasting are major operations of MANET network. The major operation in ad hoc mobile network is the broadcasting which sometime results to storm problem of the broadcast if the forwarding mechanism is not properly designated. Thus the challenges in the MANET are to reduce the broadcasting redundancy and under high transmission error rate provides high delivery ratio. Hence in our proposed research, we are introducing and investigating the new mechanism of broadcasting called Dual Covered Broadcast. This method takes the broadcast redundancy advantage order to improve packet delivery ratio especially under environments w
... Show MoreThe steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the covere
... Show MoreMany stone tools were found on a hill south of the Hor Al-Dalmaj which is located in the central part of the alluvial plain of Mesopotamia, between the Tigris and Euphrates Rivers. The types of rocks from which the studied stone tools were made are not found in the alluvial plain, because it consists of friable sand, silt, and clay. All existing sediments were precipitated in riverine environments such as point bar, over bank, and floodplain sediments. The collected stone tools were described with a magnifying glass (10 x) and a polarized microscope after they were thin sectioned. Microscopic analysis showed that these stone tools are made of sedimentary, volcanic igneous and metamorphic rocks, such as: sandstones, limestones, chert, con
... Show MoreShuaiba Formation is an important formation in Iraq, because of their deposition in the important period during the geological history of Arabian plate. The study is focused on a number of selected wells from several fields in southern Iraq, despite the many of oil studies to Shuaiba Formation but it lacks to paleontological studies. Four selected wells are chosen for the current study, Zb-290, Ru-358, R-624, WQ1-353, the selected wells are located within different fields, these are Zubair, Rumaila and West Qurna Oil Fields. In this study fourteen species followed to genus Hedbergella were discovered for first time as well as three genera followed to genus Heterohelix in the Shuaiba Formation at the different oil fields, Hedbergella tuni
... Show More