The Twofish cipher is a very powerful algorithm with a fairly complex structure that permeates most data parsing and switching and can be easily implemented. The keys of the Twofish algorithm are of variable length (128, 192, or 256 bits), and the key schedule is generated once and repeated in encrypting all message blocks, whatever their number, and this reduces the confidentiality of encryption. This article discusses the process of generating cipher keys for each block. This concept is new and unknown in all common block cipher algorithms. It is based on the permanent generation of sub keys for all blocks and the key generation process, each according to its work. The Geffe's Generator is used to generate subkeys to make each explicit block a new key that differs from block to block, gaining protection against attacks. Finally, this algorithm works almost like a One-Time Pad.
The design of future will still be the most confusing and puzzling issue and misgivings that arouse worry and leading to the spirit of adventures to make progress and arrive at the ways of reviving, creativity and modernism. The idea of prevailing of a certain culture or certain product in design depends on the given and available techniques, due to the fact that the computer and their artistic techniques become very important and vital to reinforce the image in the design. Thus, it is very necessary to link between these techniques and suitable way to reform the mentality by which the design will be reformed, from what has been said, (there has no utilization for the whole modern and available graphic techniques in the design proce
... Show MoreTourism is one of the most important sources of income of economic key countries in the world so are imports of tourism for some countries a source of income is not significant of the total revenues of States. Making those countries, and those countries a destination for visitors, and here should be interest in the Wealth and cultural heritage that distinguishes Islamic countries in general, and Iraq in particular, must be placed specialist studies in all areas for the development of this area of tourism, especially religious tourism to achieve a desired and desired of such research.It is the most important ways to develop tourism in general and religious tourism is of particular publications, advertising, and is important for us in this
... Show MoreIn this paper, two of the local search algorithms are used (genetic algorithm and particle swarm optimization), in scheduling number of products (n jobs) on a single machine to minimize a multi-objective function which is denoted as (total completion time, total tardiness, total earliness and the total late work). A branch and bound (BAB) method is used for comparing the results for (n) jobs starting from (5-18). The results show that the two algorithms have found the optimal and near optimal solutions in an appropriate times.
The Multiplicative Cyclic Group has been used to construct a New Digital Algebraic Generator System (NDAGS). This cryptosystem can be classified as a stream cipher cryptosystem. In this paper we will estimate the efficiency and security of the (NDAGS) by using the Basic Efficiency Criteria (BEC). A comparison has made between the some known generators and (NDAGS). The results of applying the BEC and the comparison results proof the high efficiency of the (NDAGS).
This research aims to understand complexity management and its impact on the use of the dynamic capabilities of a sample of private colleges. Private colleges are currently facing many crises, changes, unrest and high competitive pressures. Which is sometimes difficult or even impossible to predict. The recruitment of dynamic capabilities is also one of the challenges facing senior management at private colleges to help them survive and survive. Thus, the problem of research was (there is a clear insufficiency of interest in Complexity Management and trying to employ it in improving the dynamic capabilities of Colleges that have been discussed?). A group of private colleges was selected as a
... Show MoreThe magazine covers the subjects of (simplicity and complexity in the visual layout of the designs of magazine coverings of children) Chapter I The problem and importance of the goal and limits of research and addition to Terminology. In the second chapter the theoretical framework in which the first topic the role of simplicity and complexity in the design and the second section Visual design and design relations and the third research design in magazine covers and the third chapter includes the methodology of research and analysis and the results and conclusions and sources and the most important result of the research is (simplicity and complexity of design, Continuity and vitality and attract the attention of the receiver through the
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreTI1e Web service securi ty challenge is to understand and assess the risk involved in securing a web-based service today, based on our existing security technology, and at the same time tmck emerging standards and understand how they will be used to offset the risk in
new web services. Any security model must i llustrate how data can
now through an application and network topology to meet the
requirements defined by the busi ness wi thout exposing the data to undue risk. In this paper we propose &n
... Show MoreThe laminar fluid flow of water through the annulus duct was investigated numerically by ANSYS fluent version 15.0 with height (2.5, 5, 7.5) cm and constant length (L=60cm). With constant heat flux applied to the outer duct. The heat flux at the range (500,1000,1500,2000) w/m2 and Reynolds number values were ≤ 2300. The problem was 2-D investigated. Results revealed that Nusselt number decrease and the wall temperature increase with the increase of heat flux. Also, the average Nusselt number increase as Re increases. And as the height of the annulus increase, the values of the temperature and the local and average Nusselt number increase.