Preferred Language
Articles
/
ijs-5805
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of security to Triple Data Encryption Standard algorithm using Nth Degree Truncated Polynomial Ring Unit algorithm. This aim achieved by adding two new key functions, the first one is Enckey(), and the second one is Deckey() for encryption and decryption key of Triple Data Encryption Standard to make this algorithm more stronger. The obtained results of this paper also have good resistance against brute-force attack which makes the system more effective by applying Nth Degree Truncated Polynomial Ring Unit algorithm to encrypt and decrypt key of Triple Data Encryption Standard. Also, these modifications enhance the degree of complexity, increase key search space, and make the ciphered message difficult to be cracked by the attacker.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Feb 28 2019
Journal Name
Iraqi Journal Of Science
Key Generator to Encryption Images Based on Chaotic Maps
...Show More Authors

It is known that images differ from texts in many aspects, such as high repetition and correlation, local structure, capacitance characteristics and frequency. As a result, traditional encryption methods can not be applied to images. In this paper we present a method for designing a simple and efficient messy system using a difference in the output sequence. To meet the requirements of image encryption, we create a new coding system for linear and nonlinear structures based on the generation of a new key based on chaotic maps.

The design uses a kind of chaotic maps including the Chebyshev 1D map, depending on the parameters, for a good random appearance. The output is a test in several measurements, including the complexity of th

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
Authentication of Digital Video Encryption
...Show More Authors

The security of multimedia data becoming important spatial data of monitoring systems that contain videos prone to attack or escape via the internet, so to protect these videos used proposed method combined between encryption algorithm and sign algorithm to get on authenticated video. The proposed encryption algorithm applied to secure the video transmission by encrypt it to become unclear. This done by extract video to frames and each frame separate to three frames are Red, Green, and Blue, this frames encrypt by using three different random keys that generated by a function for generating random numbers, as for sign algorithm applied for authentication purpose that enable the receiver from sure of the identity of the sender and provide

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 11 2021
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
Survey on 3D Content Encryption
...Show More Authors

<p class="0abstract">The rapidly growing 3D content exchange over the internet makes securing 3D content became a very important issue. The solution for this issue is to encrypting data of 3D content, which included two main parts texture map and 3D models. The standard encryption methods such as AES and DES are not a suitable solution for 3D applications due to the structure of 3D content, which must maintain dimensionality and spatial stability. So, these problems are overcome by using chaotic maps in cryptography, which provide confusion and diffusion by providing uncorrelated numbers and randomness. Various works have been applied in the field of 3D content-encryption based on the chaotic system. This survey will attempt t

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Sep 30 2021
Journal Name
Iraqi Journal Of Science
Playfair with Multi Strata Encryption
...Show More Authors

     Playfair cipher is a substitution scheme. The classical playfair scheme has a limited matrix size  containing only uppercase letters, so it is prone to hackers and cryptanalysis. To increase the resistance of playfair cipher, a new encipherment and decipherment method is proposed in this work, which depends on the permutation and its inverse, respectively. In addition, a modified  key matrix is utilized, which includes capital and small Alphabets, numbers, and 38 special characters collected from ASCII codes. In the proposed method, both substitution and transposition schemes are used, where the first stratum of the cipher is a substitution by using  key matrix and the second stratum is a transposi

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Thu Nov 19 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Enhanced Multistage RSA Encryption Model
...Show More Authors

View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Wed Dec 30 2020
Journal Name
Iraqi Journal Of Science
Comparing Ionospheric MUF using IRI16 Model with Mid-Latitude Ionosonde Observations and Associated with Strong Geomagnetic Storms
...Show More Authors

High frequency (HF) radio wave propagation depends on the ionosphere status which is changed with the time of day, season, and solar activity conditions. In this research, ionosonde observations were used to calculate the values of maximum usable frequency (MUF) the ionospheric F2- layer during strong geomagnetic storms (Dst ≤ -100 nT) which were compared with the predicted MUF for the same layer by using IRI-16 model. Data from years 2015 and 2017, during which five strong geomagnetic storms occurred, were selected from two Japanese ionosonde stations (Kokubunji and Wakkanai) located at the mid-latitude region. The results of the present work do not show a good correlation between the observed and predicted MUF values for F2- laye

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Thu May 17 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Determination of the Degree of Consumption (DoC) of Lube Engine Oils Using Fluorescence Spectroscopy
...Show More Authors

    The accreditation of a fast, inexpensive, and simple way to discriminate between different kinds of oils and their efficacy “degree of consumption (DoC)” has been developed. The fluorescence spectroscopy provides a reliable method for oil inspection without resorting to tedious separation.

Different new and used oil samples available in the local Iraqi market were investigated. While the challenge is to build a directory containing data of all the oils available in the local market. This method expected to control the falsified (forged) trademarks of motor oils and to discriminate between different oils.

The excitation-emission spectra of oil samples were determined in the range of 200 â€

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 26 2023
Journal Name
Wasit Journal Of Pure Sciences
Pure Graph of a Commutative Ring
...Show More Authors

A new definition of a graph called Pure graph of a ring denote Pur(R) was presented , where the vertices of the graph represent the elements of R such that there is an edge between the two vertices ???? and ???? if and only if ????=???????? ???????? ????=????????, denoted by pur(R) . In this work we studied some new properties of pur(R) finally we defined the complement of pur(R) and studied some of it is properties

View Publication Preview PDF
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Iraqi Journal Of Science
P, P-L. Compact Topological Ring
...Show More Authors

In this paper, we introduced some new definitions on P-compact topological ring and PL-compact topological ring for the compactification in topological space and rings, we obtain some results related to P-compact and P-L compact topological ring.

View Publication Preview PDF
Publication Date
Sat Jan 30 2021
Journal Name
Iraqi Journal Of Science
Intrusion Detection System Using Data Stream Classification
...Show More Authors

Secure data communication across networks is always threatened with intrusion and abuse. Network Intrusion Detection System (IDS) is a valuable tool for in-depth defense of computer networks. Most research and applications in the field of intrusion detection systems was built based on analysing the several datasets that contain the attacks types using the classification of batch learning machine. The present study presents the intrusion detection system based on Data Stream Classification. Several data stream algorithms were applied on CICIDS2017 datasets which contain several new types of attacks. The results were evaluated to choose the best algorithm that satisfies high accuracy and low computation time.

View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Crossref