Preferred Language
Articles
/
ijs-7815
Developing the Complexity and Security of the Twofish Algorithm Through a New Key Scheduling Design
...Show More Authors

     The Twofish cipher is a very powerful algorithm with a fairly complex structure that permeates most data parsing and switching and can be easily implemented. The keys of the Twofish algorithm are of variable length (128, 192, or 256 bits), and the key schedule is generated once and repeated in encrypting all message blocks, whatever their number, and this reduces the confidentiality of encryption. This article discusses the process of generating cipher keys for each block. This concept is new and unknown in all common block cipher algorithms. It is based on the permanent generation of sub keys for all blocks and the key generation process, each according to its work. The Geffe's Generator is used to generate subkeys to make each explicit block a new key that differs from block to block, gaining protection against attacks. Finally, this algorithm works almost like a One-Time Pad.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed May 03 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Security of Iris Recognition and Voice Recognition Techniques
...Show More Authors

  Recently, biometric technologies are used widely due to their improved security that decreases cases of deception and theft. The biometric technologies use physical features and characters in the identification of individuals. The most common biometric technologies are: Iris, voice, fingerprint, handwriting and hand print. In this paper, two biometric recognition technologies are analyzed and compared, which are the iris and sound recognition techniques. The iris recognition technique recognizes persons by analyzing the main patterns in the iris structure, while the sound recognition technique identifies individuals depending on their unique voice characteristics or as called voice print. The comparison results show that the resul

... Show More
View Publication Preview PDF
Publication Date
Thu Aug 30 2018
Journal Name
Iraqi Journal Of Science
Towards Generating Robust Key Based on Neural Networks and Chaos Theory
...Show More Authors

There are large numbers of weakness in the generated keys of security algorithms. This paper includes a new algorithm to generate key of 5120 bits for a new proposed cryptography algorithm for 10 rounds that combine neural networks and chaos theory (1D logistic map). Two methods of neural networks (NN) are employed as Adaline and Hopfield and the results are combined through several sequential operation. Carefully integrating high quality random number generators from neural networks and chaos theory to obtain suitable key for randomness and complexity.

View Publication Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Science
Novel Dynamic S-Box Based on Password Key and Circle Map
...Show More Authors

     Many cryptosystems and security techniques use substitution boxes to ensure the data’s secure communication. A new technique is presented for generating a robust S-box to fulfill security requirements. The AES algorithm represents a block cipher cryptographic algorithm. It was selected by the National Institute of Science and Technology as the optimal cryptographic algorithm in 2011. Through the study of the properties of original S-BOX, this algorithm has been subjected to a number of attacks (linear, differential, statistical, and interpolation), and original S-BOX has been static, which makes the attack strong and shows a weakness in the algorithm.  It is necessary to make this algorithm more efficient and powerful through

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (3)
Scopus Crossref
Publication Date
Sun Mar 15 2020
Journal Name
Journal Of The College Of Education For Women
Urban Security in Cities Planning
...Show More Authors

Cities have witnessed great changes since the planning of the first cities. This is due to the increase in population and problems in services which affect urban security. As such, urban security is directed and affected by the nature of city planning and the types of services. Besides, the kind of services plays an imminent place in providing urban security at all levels. Other factors that influence urban security can be limited to the increase of population, economic and social changes. This leads to losing urban control. This study will explore the historical chronology to identify weaknesses in urban planning since its dawn and reaching solutions to protect urban security. The importance of the research lies in achieving urban secur

... Show More
View Publication
Publication Date
Sat Jun 06 2020
Journal Name
Journal Of The College Of Education For Women
Urban Security in Cities Planning
...Show More Authors

Cities have witnessed great changes since the planning of the first cities. This is due to the increase in population and problems in services that affect urban security. As such, urban security is directed and affected by the nature of city planning and the types of services. Besides, the kind of services plays an imminent place in providing urban security at all levels. Other factors that influence urban security can be limited to the increase of population, economic and social changes. This leads to losing urban control. This study will explore the historical chronology to identify weaknesses in urban planning since its dawn and reaching solutions to protect urban security. The importance of the research lies in achieving urban securi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Aug 30 2018
Journal Name
Iraqi Journal Of Science
Construct a New System as a Combining Function for the LFSR in the Stream Cipher Systems Using Multiplicative Cyclic Group
...Show More Authors

In this paper, we construct a new mathematical system as Multiplicative Cyclic Group (MCG), called a New Digital Algebraic Generator (NDAG) Unit, which would generate digital sequences with good statistical properties. This new Unit can be considered as a new basic unit of stream ciphers.

A (NDAG) system can be constructed from collection of (NDAG) units using a Boolean function as a combining function of the system. This system could be used in cryptography as like as Linear Feedback Shift Register (LFSR) unit. This unit is basic component of  a stream cipher system.

View Publication Preview PDF
Publication Date
Sun Nov 07 2021
Journal Name
Review Of International Geographical Education Online
Requirements of Formulating a National Strategy for Developing the Cybersecurity System in Iraq According to GCI.v4(2019) Index
...Show More Authors

The present study aims to present a proposed realistic and comprehensive cyber strategy for the Communications Directorate for the next five years (2022-2026) based on the extent of application and documentation of cybersecurity measures in the Directorate and the scientific bases formulating the strategy. The present study is significant in that it provides an accurate diagnosis of the capabilities of the cyber directorate in terms of strengths and weaknesses in its internal environment and the opportunities and threats that surround it in the external environment, based on the results of the assessment of the reality of cybersecurity according to the global Cybersecurity index, which provides a strong basis for building its strategic dire

... Show More
Preview PDF
Scopus (2)
Scopus
Publication Date
Sun Dec 10 2017
Journal Name
Al-academy
Form and function in the design of intellectual toys
...Show More Authors

Playing is the only common language among children in every place and time, to the fact that what distinguishes the children is their quest to play and fun way innate, not acquired, which is expressed with the child really is one of the rights. And play a key entrance to the growth of the child mentally, intellectually and cognitively and not for the child emotionally and socially just. In the play the child begins to identify and classify objects and learn concepts and circulate among themselves on a linguistic basis. Activity here and play a major role in leading the linguistic development of the child in the composition has the communication skills.

The Games (especially intellectual ones) Whatever the cause of the development

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 19 2019
Journal Name
Political Sciences Journal
Rules and steps The design of university research projects
...Show More Authors

Research is a study conducted by a researcher or a group of researchers to uncover ambiguity, complete a knowledge, or define a relationship, Solve a problem, or answer a question by carefully investigating the comprehensive and in-depth examination of the evidence and evidence related to this knowledge, revealing a relationship, or solving a problem, or answering a question, to be a systematic, In evidence and evidence that reveal facts and general rules, relationships or solutions, in addition to providing knowledge Human rights are verifiable, tested and confirmed. The university research (graduate research, master's thesis, doctoral dissertation) is the most important type of research, and it is supposed to be the best one, since it

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon May 01 2017
Journal Name
Ieee International Electrical Machines & Drives Conference Ieee (iemdc2017), Miami, Usa
The effect of power converter on the design of a Linear Alternator for use with a Joule Cycle-Free Piston Engine
...Show More Authors

Scopus (3)
Crossref (4)
Scopus Crossref