Preferred Language
Articles
/
ijs-7815
Developing the Complexity and Security of the Twofish Algorithm Through a New Key Scheduling Design
...Show More Authors

     The Twofish cipher is a very powerful algorithm with a fairly complex structure that permeates most data parsing and switching and can be easily implemented. The keys of the Twofish algorithm are of variable length (128, 192, or 256 bits), and the key schedule is generated once and repeated in encrypting all message blocks, whatever their number, and this reduces the confidentiality of encryption. This article discusses the process of generating cipher keys for each block. This concept is new and unknown in all common block cipher algorithms. It is based on the permanent generation of sub keys for all blocks and the key generation process, each according to its work. The Geffe's Generator is used to generate subkeys to make each explicit block a new key that differs from block to block, gaining protection against attacks. Finally, this algorithm works almost like a One-Time Pad.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
Slip Effect on the Peristaltic Transport of MHD Fluid through a Porous Medium with Variable Viscosity
...Show More Authors

The present paper concerns with peristaltic analysis of MHD viscous fluid in a two dimensional channel with variable viscosity through a porous medium under the effect of slip condition. Along wave length and low Reynolds number assumption is used in the problem formulation. An analytic solution is presented for the case of hydrodynamic fluid while for magneto hydrodynamic fluid a series solution is obtained in the small power of viscosity parameter. The salient features of pumping and trapping phenomena are discussed in detail through a numerical integration. The features of the flow characteristics are analyzed by plotting graphs and discussed in detail. When .

View Publication Preview PDF
Publication Date
Thu Feb 28 2019
Journal Name
Iraqi Journal Of Science
Key Generator to Encryption Images Based on Chaotic Maps
...Show More Authors

It is known that images differ from texts in many aspects, such as high repetition and correlation, local structure, capacitance characteristics and frequency. As a result, traditional encryption methods can not be applied to images. In this paper we present a method for designing a simple and efficient messy system using a difference in the output sequence. To meet the requirements of image encryption, we create a new coding system for linear and nonlinear structures based on the generation of a new key based on chaotic maps.

The design uses a kind of chaotic maps including the Chebyshev 1D map, depending on the parameters, for a good random appearance. The output is a test in several measurements, including the complexity of th

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A New Cipher Based on Feistel Structure and Chaotic Maps
...Show More Authors

Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,

            While using chaotic maps, in the suggested system, called

... Show More
View Publication Preview PDF
Scopus (18)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Civil Engineering Journal
Developing Water Quality Index to Assess the Quality of the Drinling Water
...Show More Authors

In the present study, an attempt has been to develop a new water quality index (WQI) method that depends on the Iraqi specifications for drinking water (IQS 417, 2009) to assess the validity of the Euphrates River for drinking by classifying the quality of the river water at different stations along its entire reach inside the Iraqi lands. The proposed classifications by this method are: Excellent, Good, Acceptable, Poor, and Very poor. Eight water quality parameters have been selected to represent the quality of the river water these are: Ion Hydrogen Concentration (pH), Calcium (Ca), Magnesium (Mg), Sodium (Na), Chloride (Cl), Sulphate (SO_4), Nitrate (NO_3), and Total Dissolved Solids (TDS). The variation of the water quality parameters

... Show More
Publication Date
Tue Oct 30 2018
Journal Name
Https://www.researchgate.net/journal/civil-engineering-journal-2476-3055
Developing Water Quality Index to Assess the Quality of the Drinking Water
...Show More Authors

In the present study, an attempt has been to develop a new water quality index (WQI) method that depends on the Iraqi specifications for drinking water (IQS 417, 2009)  to assess the validity of the Euphrates River for drinking by classifying the quality of the river water at different stations along its entire reach inside the Iraqi lands. The proposed classifications by this method are: Excellent, Good, Acceptable, Poor, and Very poor. Eight water quality parameters have been selected to represent the quality of the river water these are: Ion Hydrogen Concentration (pH), Calcium (Ca), Magnesium (Mg), Sodium (Na), Chloride (Cl), Sulphate (SO_4), Nitrate (NO_3), and Total Dissolved Solids (TDS). The variation of the water quality p

... Show More
Crossref (20)
Crossref
Publication Date
Mon May 31 2021
Journal Name
Iraqi Journal Of Science
Improving Security of the Crypto-Stego Approach using Time Sequence Dictionary and Spacing Modification Techniques
...Show More Authors

Cryptography steganography is a practical tool for data security. Hybridization of the cryptography with steganography can provide more security by taking advantage of each technique. This work proposes a method for improving the crypto-stego method by utilizing the proposed dictionary method to modified ciphertext. After that, the modified encrypt ciphertext id was hidden in the text by using the proposed method. For cryptography, an Advanced Encryption Standard (AES) was utilized to encrypt the message. The AES employed a 128bit block size and 256bit key size. The ciphertext characters were then replaced by the characters identified by a dictionary list. The dictionary is time-dependent, where each of the equivalent words shift based o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 01 2017
Journal Name
Iracst – International Journal Of Computer Networks And Wireless Communications (ijcnwc)
Optimizing Network Security Considerations with Transition to IPv6 in University of Baghdad, A Prototype
...Show More Authors

It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.

Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Design and Performance Investigation of a Solar- Powered Biological Greywater Treatment System in the Iraqi Climate
...Show More Authors

            The increase in population resulted in an increase in the consumption of water. The present work investigates the performance of a recycling solar- powered greywater treatment system for the purposes of irrigation, used to reduce the amount of waste grey water and reduce electricity consumption and reduce the costs of constructing large scale water treatment plants. The system consumes about 3814W per hour and provides water treatment about 1.4 m3 per day. The proposed system is designed to    residential, office and governmental buildings application. Tests are conducted in an office building at the Ministry of Science and Technology site in Baghdad. Laboratorial water samples testing analyses are co

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Thu Jul 27 2023
Journal Name
Journal Of Design And Textiles
Defining the Design Process: Methodology and Creation
...Show More Authors

The current study is unique in its emphasis on investigating design operation and concept from multiple scientific perspectives: including invention, technique, and design components. This research tends to study the methodology and creation of design process in a holistic manner so that the readers may grasp their characteristics and properties down to its minute epistemological detail. The investigation of the design concept is where the real groundwork and pressing need for the study begin. Creation and methodology are two primary concepts in relation to design these relationships can be formed in any design because of the various forces that act upon it. The primordial objective of this study is to evaluate the relationship betw

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sun Jul 31 2022
Journal Name
Iraqi Journal Of Science
The Key Role of Bone Function Markers in Patients with Type (II) Diabetes Mellitus
...Show More Authors

      Complications associated with diabetes are a consequence of acute disturbance in glucose metabolism in a human body. The most significant complication of diabetes is bone disorders which contributes to high levels of bone disability. This study included 118 diabetic patients, 56 males, 62 females, and 60 healthy non-diabetic controls, 30 males, 30 females. The patients and controls were age matched. Circulating levels of bone function markers (osteoprotegerin, vitamin D, PTH, total calcium and inorganic phosphorus) were determined in all subject groups. The data obtained from this study showed that the serum levels of osteoprotegerin had significantly increased in both diabetic male & female in both age ranges which were 4

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref