Preferred Language
Articles
/
ijs-5689
Efficient Plain Password Cryptanalysis Techniques
...Show More Authors

In this research work, some low complexity and efficient cryptanalysis approaches are proposed to decrypt password (encryption keys). Passwords are still one of the most common means of securing computer systems. Most organizations rely on password authentication systems, and therefore, it is very important for them to enforce their users to have strong passwords. They usually ignore the importance of usability of the password for the users. The more complex they are the more they frustrate users and they end up with some coping strategies such as adding “123” at the end of their passwords or repeating a word to make their passwords longer, which reduces the security of the password, and more importantly there is no scientific basis for these password creation policies to make sure that passwords that are created based on these rules are resistance against real attacks. The current research work describes different password creation policies and password checkers that try to help users create strong passwords and addresses their issues. Metrics for password strength are explored in this research and efficient approaches to calculate these metrics for password distributions are introduced. Furthermore, efficient technique to estimate password strength based on its likelihood of being cracked by an attacker is described. In addition, a tool called PAM has been developed and explained in details in this paper to help users have strong passwords using these metrics; PAM is a password analyzer and modifier.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 01 2014
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Towards Perceptions building a descriptive and procedural for the knowledge assets at the center of learning and growth for the techniques of Balanced Score card in the light of the strategic map concepts to achieve the strategic and operational: requirements of the contemporary business
...Show More Authors

Abstract:

   Witness the current business environment changes rapidly reflected on the performance of the facility wishing to stay , which is no longer style reaction enough to handle installations with their environment , and quickly began to lose its luster with the emergence of a message and the vision of contemporary business environment from a set of parts interacting with each other and the concept of behavioral includes all dimensions of performance, it is imperative to adopt a system installations influence variables and positive interaction through the development of strategic plans and the use of implementation and follow-up strategies to ensure the effectiveness of the method for meas

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 12 2022
Journal Name
Iraqi Journal Of Science
Constructing of Analysis Mathematical Model for Stream Cipher Cryptosystems
...Show More Authors

The aim of this paper is to construct the analysis mathematical model for stream cipher cryptosystems in order to be cryptanalysis using the cryptanalysis tools based on plaintext attack (or part from it) or ciphertext only attack, choosing Brüer generator as study case of nonlinear stream cipher system.
The constructing process includes constructing the linear (or non-linear) equations system of the attacked nonlinear generator. The attacking of stream cipher cryptosystem means solving the equations system and that means finding the initial key values for each combined LFSR. 

View Publication Preview PDF
Publication Date
Thu Jun 30 2011
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
CRACKING ACTIVITY OF PREPARED Y-ZEOLITE CATALYST USING CUMENE ON FLUIDIZED BED REACTOR
...Show More Authors

The catalytic activity of faujasite type NaY catalysts prepared from local clay (kaolin) with different Si/Al ratio was studied using cumene cracking as a model for catalytic cracking process in the temperature range of 450-525° C, weight hourly space velocity (WHSV) of 5-20 h1, particle size ≤75μm and atmospheric pressure. The catalytic activity was investigated using experimental laboratory plant scale of fluidized bed reactor.
It was found that the cumene conversion increases with increasing temperature and decreasing WHSV. At 525° C and WHSV 5 h-1, the conversion was 42.36 and 35.43 mol% for catalyst with 3.54 Si/Al ratio and Catalyst with 5.75 Si/Al ratio, respectively, while at 450° C and at the same WHSV, the conversion w

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More
Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Engineering
The use of Prepared Zeolite Y from Iraqi kaolin for Fluid Catalytic Cracking of Vacuum Gas Oil
...Show More Authors

The faujasite type Y zeolite catalyst was prepared from locally available kaolin. For prepared faujasite type NaY zeolite X-ray, FT-IR, BET pore volume and surface area, and silica/ alumina were determined. The Xray and FT-IR show the compatibility of prepared catalyst with the general structure of standard zeolite Y. BET test shows that the surface area and pore volume of prepared catalyst were 360 m2 /g and 0.39 cm3 /g respectively.
The prepared faujasite type NaY zeolite modified by exchanging sodium ion with ammonium ion using ammonium nitrate and then ammonium ion converted to hydrogen ion. The maximum sodium ion exchange with ammonium ion was 53.6%. The catalytic activity of prepared faujasite type NaY, NaNH4Y and NaHY zeolites

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 30 2010
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
FLUID CATALYTIC CRACKING OF PETROLEUM FRACTION (VACUUM GAS OIL) TO PRODUCE GASOLINE
...Show More Authors

In this work, fluid catalytic cracking of vacuum gas oil to produce gasoline over prepared faujasite type Y zeolite was investigated using experimental laboratory plant scale of fluidized bed reactor.
The catalytic activity of prepared faujasite type NaY, NaNH4Y and NaHY zeolites was investigated. The cracking process was carried out in the temperature range 440 to 500 oC, weight hourly space velocity (WHSV) range 10 to 25 h-1 ,and atmospheric pressure . The catalytic activities of the prepared faujasite type NaY , NaNH4Y and NaHY zeolites were determined in terms of vacuum gas oil (VGO) conversion, and gasoline yield . The conversion at 500oC and WHSV10 hr-1 by using faujasite type NaY, NaNH4Y and NaHY zeolite were 50.2%, 64.1% and 6

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 30 2014
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Treatment of Slack Wax by Thermal Cracking Process
...Show More Authors

This work deals with thermal cracking of slack wax produced as a byproduct from solvent dewaxing process of medium lubricating oil fraction in AL-Dura refinery. The thermal cracking process was carried out at a temperature ranges 480-540 ºC and atmospheric pressure. The liquid hourly space velocity (LHSV) for thermal cracking was varied between 1.0-2.5 . It was found that the conversion increased (61 - 83) with the increasing of reaction temperature (480 - 540) and decreased (83 - 63) with the increasing of liquid hourly space velocity (1.0 - 2.5).
The maximum gasoline yield obtained by thermal cracking process (48.52 wt. % of feed) was obtained at 500 ºC and liquid hour space velocity 1 . The obtaining liquid product at the best op

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref