A key agreement protocol (KAP) is a fundamental block in any cryptosystem since it ensures secure communication between two parties. Furthermore, KAP should include advanced features in limited-resource environments such as IoT, in which this protocol must be lightweight and efficient in consuming resources. Despite the Elliptic Curve Diffie-Hellman (ECDH) algorithm having often been considered efficient in providing an acceptable security degree with less resource consumption, it has suffered from weakness against Man-In-The-Middle Attacks (MITMA). This paper presents two versions of the Variant Elliptic Curve Diffie-Hellman (VECDH) algorithms as a key agreement protocol. The security analysis indicates that the proposed algorithm could be more robust compared to the MITMA, in addition to several security features. The proposed algorithms scale down the computation complexity by decreasing the arithmetic operations, to make the algorithms the lowest workload and suitable for application in restricted resource environments.
Receipt date:12/15/2020 accepted date:12/29/2020 Publication date: 12/31/2021
This work is licensed under a Creative Commons Attribution 4.0 International License.
The study aims to review the division between Fateh and Hamas between 2006 -2007 based primarily on the documents and statements that have been announced in various media, through a review of the course of events after the Palestinian elections of 2006, which resulted in the victory of Hamas, indicating the course division, and the position of each of
... Show MoreThe title of the research (the occasion in Surat Maryam) highlights the importance of the subject because he is studying Surah from the wall of the Koran, and that the best times of preoccupation with this light shown, study and thoughtful, and the reason for choosing the topic that the occasion of science helps in understanding the Almighty God in his book, and not Falling in confusion or error, or exaggerated interpretations, and be the key to knowing the rule of the Koran and repeating it, but the results of the conclusion that the occasion has many benefits: including making parts of speech taking each other's necks, strengthens that link and the authorship becomes his case in the case of tight construction , And that the occasion of
... Show MoreMaterials with external dimensions of one or more nanometers are referred to as nanomaterials. These structures result from a number of manufacturing processes. They are used in many industries, including pharmaceuticals, which is the most significant one. Numerous variables, including size, shape, surface morphology, crystallinity, solubility, etc., affect physical properties. While new physical and chemical processes are being created constantly, the biological method is the ideal strategy for synthesizing nanoparticles since it is straightforward, safe, and economical. Different kinds of nanoparticles can be metabolically synthesized by a wide variety of biological sources, including plants, bacteria, fungi, and yeast. There are
... Show MoreChanging the Wine into Vinegar
Keeping the secret itself of topics for values are positive attribute of personality traits balanced. Objective of this research study of Keeping the secret when spouses, the study of the theory based on the research and literature that dealt with the subject study is important to mention that there was no study of one Iraqi addressed the study of Keeping the secret when spouses.
The researcher found the importance of the study of it's Keeping the secret when spouses. the factors that affect family relationships in terms of the stability of the marital relationship and this is reflected positively on the lives of family and community.
... Show MoreThe increase in the number of people with special needs in general, and especially the category of the disabled, whose numbers in the communities reached about 10% - 15% (900 million disabled people in the world, on the other hand, the confirmation of constitutional texts and international conventions and domestic legislation to approve The study deals with the most important aspects of legal protection, namely, penal protection, in its procedural form. This study deals with the extent of its adequacy and its suitability to the disabled entity, which represents some of the shortcomings of its functions in contrast to its normal hypothesis. In other words, In the case of being (Jana) in the crime in view of the guarantees that a normal pe
... Show MoreThe revolution of technology in the 21st century has changed radically the
climate of opinion concerning second language education. In order to excel in
today’s world, teachers and learners need to adopt new roles and be equipped with
new skills and competencies that go beyond the basic ones of listening, speaking,
reading, and writing; skills that cannot be gained if teachers teach mere academic
subjects, and students are evaluated on how well they have learnt the minute sub
skills in those content areas.
This session will touch upon several skills which may be considered the
new basics of the 21st century. Among these skills are: autonomy, active learning,
critical thinking, cooperative learning, and digita
تعرض بلدنا العراق الى أقسى الهجمات الإرهابية التي أثرت بشكل مباشر وغير مباشر في النواحي المالية و الاقتصادية وبرز هذا التأثير في وسيلة الدولة لإدارتها المالية و هي الموازنة العامة التي تحمل في طياتها توقعات الدولة الانفاقية و قنواتها الايرادية ومن أهم هذه التوقعات هي ما تنتجه العمليات الإرهابية وما تخلفه من تبعات وخسائر بشرية ومادية ومعنوية، مقدرة بشكل مالي ومبالغ نقدية .
وتصدي الدولة في هذه ال
... Show More