Preferred Language
Articles
/
ijs-5689
Efficient Plain Password Cryptanalysis Techniques
...Show More Authors

In this research work, some low complexity and efficient cryptanalysis approaches are proposed to decrypt password (encryption keys). Passwords are still one of the most common means of securing computer systems. Most organizations rely on password authentication systems, and therefore, it is very important for them to enforce their users to have strong passwords. They usually ignore the importance of usability of the password for the users. The more complex they are the more they frustrate users and they end up with some coping strategies such as adding “123” at the end of their passwords or repeating a word to make their passwords longer, which reduces the security of the password, and more importantly there is no scientific basis for these password creation policies to make sure that passwords that are created based on these rules are resistance against real attacks. The current research work describes different password creation policies and password checkers that try to help users create strong passwords and addresses their issues. Metrics for password strength are explored in this research and efficient approaches to calculate these metrics for password distributions are introduced. Furthermore, efficient technique to estimate password strength based on its likelihood of being cracked by an attacker is described. In addition, a tool called PAM has been developed and explained in details in this paper to help users have strong passwords using these metrics; PAM is a password analyzer and modifier.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 01 2009
Journal Name
Journal Of Lightwave Technology
A Random Number Generator Based on Single-Photon Avalanche Photodiode Dark Counts
...Show More Authors

View Publication
Scopus (17)
Crossref (16)
Scopus Clarivate Crossref
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Journal Of Science
A Lightweight Image Encryption Algorithm Based on Elliptic Curves and a 5D Logistic Map
...Show More Authors

    Cryptography can be thought of as a toolbox, where potential attackers gain access to various computing resources and technologies to try to compute key values. In modern cryptography, the strength of the encryption algorithm is only determined by the size of the key. Therefore, our goal is to create a strong key value that has a minimum bit length that will be useful in light encryption. Using elliptic curve cryptography (ECC) with Rubik's cube and image density, the image colors are combined and distorted, and by using the Chaotic Logistics Map and Image Density with a secret key, the Rubik's cubes for the image are encrypted, obtaining a secure image against attacks. ECC itself is a powerful algorithm that generates a pair of p

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Fri Mar 31 2017
Journal Name
Al-khwarizmi Engineering Journal
Preparation of Light Fuel Fractions from Heavy Vacuum Gas Oil by Thermal Cracking Reaction
...Show More Authors

This work deals with thermal cracking of heavy vacuum gas oil which produced from the top of vacuum distillation unit at Al- DURA refinery, by continuous process. An experimental laboratory plant scale was constructed in laboratories of chemical engineering department, Al-Nahrain University and Baghdad University. The thermal cracking process was carried out at temperature ranges between 460-560oC and atmospheric pressure with liquid hourly space velocity (LHSV) equal to 15hr-1.The liquid product from thermal cracking unit was distilled by atmospheric distillation device according to ASTM D-86 in order to achieve two fractions, below 220oC as a gasoline fraction and above 220oC as light cycle o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Engineering
Studying the Combination Effect of Additives and Micro Steel Fibers on Cracks of Self-Healing Concrete
...Show More Authors

In this study, the effect of the combination of micro steel fibers and additives (calcium hydroxide and sodium carbonate) on the size of cracks formation and healing them were investigated. This study aims to apply the use of self-healing phenomenon to repair cracks and to enhance the service life of the concrete structures. Micro steel fibers straight type were used in this research with 0.2% and 0.4% by volume of concrete. A weight of 20 and 30 kg/m3 of Ca(OH)2 and 2 and 3 kg/m3 of Na2CO3 were used as a partial cement replacement. The results confirm that the concrete cracks were significantly self-healed up to 30 days re-curing. Cracks width up to 0.2 mm were comp

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 31 2020
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
SIMULATION AND MODELING OF HYDRO CRACKING REACTR TO REDUCE POLLUTION CAUSED BY REFINERIES: SIMULATION AND MODELING OF HYDRO CRACKING REACTR TO REDUCE POLLUTION CAUSED BY REFINERIES
...Show More Authors

Hydro cracking of heavy oil is used in refinery to produce invaluable products. In this research, a model of hydro cracking reactor has been used to study the behavior of heavy oil in hydro cracking under the conditions recommended by literature in terms lumping of feed and products. The lumping scheme is based on five lumps include: heavy oil, vacuum oil, distillates, naphtha and gases. The first order kinetics was assumed for the conversion in the model and the system is modeled as an isothermal tubular reactor. MATLAB 6.1 was used to solve the model for a five lump scheme for different values of feed velocity, and temperature.

View Publication Preview PDF
Publication Date
Sat Jan 13 2018
Journal Name
Journal Of Engineering
Investigating the Influence of the Cerium loading in prepared Y zeolite from Iraqi kaolin on its Catalytic Performance
...Show More Authors

In this study, the effects of different loading doses of cerium in the prepared NaY zeolite from Iraqi kaolin were investigated. Al-Duara  refinery atmospheric residue fluid catalytic cracking was selected as palpation reaction for testing the catalytic activity of cerium loading NaY zeolite.  The insertion of cerium in NaY zeolites has been synthesized by simple ion exchange methods. Three samples of modified zeolite Y have been obtained by replacing the sodium ions in the original sample with cerium and the weight percent added are 0.35, 0.64, and 1.06 respectively. The effects of cerium loading to zeolite Y in different weight percent on the cracking catalysts were studied by employing a laboratory fluidized

... Show More
View Publication Preview PDF
Publication Date
Sat Nov 01 2014
Journal Name
Journal Of Next Generation Information Technology
The effect of the smoothing filter on an image encrypted by the blowfish algorithm then hiding it in a BMP image
...Show More Authors

order to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs

View Publication Preview PDF
Publication Date
Wed Feb 22 2023
Journal Name
Iraqi Journal Of Science
Improved Rijndael Algorithm by Encryption S-Box Using NTRU Algorithm
...Show More Authors

With the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 26 2018
Journal Name
Iraqi Journal Of Science
Using the Basic Efficiency Criteria to Estimate the Security of the New Digital Algebraic Generator System (NDAGS)
...Show More Authors

The Multiplicative Cyclic Group has been used to construct a New Digital Algebraic Generator System (NDAGS). This cryptosystem can be classified as a stream cipher cryptosystem. In this paper we will estimate the efficiency and security of the (NDAGS) by using the Basic Efficiency Criteria (BEC). A comparison has made between the some known generators and (NDAGS). The results of applying the BEC and the comparison results proof the high efficiency of the (NDAGS).

View Publication Preview PDF
Publication Date
Sun Sep 24 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Combining a Hill Encryption Algorithm and LSB Technique With Dispersed Way for Securing Arabic and English Text Messages Hidden in Cover Image
...Show More Authors

         In this paper a hybrid system was designed for securing transformed or stored text messages(Arabic and english) by embedding the message in a colored image as a cover file depending on LSB (Least Significant Bit) algorithm in a dispersed way and employing Hill data encryption algorithm for encrypt message before being hidden, A key of 3x3 was used for encryption with inverse for decryption, The system scores a good result for PSNR rate      ( 75-86) that differentiates according to  length of message and image resolution.

View Publication Preview PDF