As a new technology, blockchain provides the necessary capabilities to assure data integrity and data security through encryption. Mostly, all existing algorithms that provide security rely on the process of discovering a suitable key. Hence, key generation is considered the core of powerful encryption. This paper uses Zernike moment and Mersenne prime numbers to generate strong prime numbers by extracting the features from biometrics (speech). This proposed system sends these unique and strong prime numbers to the RSA algorithm to generate the keys. These keys represent a public address and a private key in a cryptocurrency wallet that is used to encrypt transactions. The benefit of this work is that it provides a high degree
... Show MoreRivest Cipher 4 (RC4) is an efficient stream cipher that is commonly used in internet protocols. However, there are several flaws in the key scheduling algorithm (KSA) of RC4. The contribution of this paper is to overcome some of these weaknesses by proposing a new version of KSA coined as modified KSA . In the initial state of the array is suggested to contain random values instead of the identity permutation. Moreover, the permutation of the array is modified to depend on the key value itself. The proposed performance is assessed in terms of cipher secrecy, randomness test and time under a set of experiments with variable key size and different plaintext size. The results show that the RC4 with improves the randomness and secrecy with
... Show More
Background: Cerebrospinal fluid leak is a relatively common problem ranging from 0.5% to 18% with traumatic or incidental injury to the Dura intra-operatively1, 2. Traumatic injury mostly occurs due to mechanical trauma with subsequent thecal sac laceration mainly in the thoracolumbar region. Incidental Dural injury commonly happens in patients undergoing spinal surgery for any reason.
Objective: Introduce a maneuver to be used during operations when the patients have either traumatic or iatrogenic injury to the Dura which would prevent CSF leak post-operatively.
Method: A case series study conducted in Baghdad, medical city, between June 2014 an
... Show MoreIn the present work a dynamic analysis technique have been developed to investigate and characterize the quantity of elastic module degradation of cracked cantilever plates due to presence of a defect such as surface of internal crack under free vibration. A new generalized technique represents the first step in developing a health monitoring system, the effects of such defects on the modal frequencies has been the main key quantifying the elasticity modulii due to presence any type of un-visible defect. In this paper the finite element method has been used to determine the free vibration characteristics for cracked cantilever plate (internal flaws), this present work achieved by different position of crack. Stiffness re
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreIt is known that images differ from texts in many aspects, such as high repetition and correlation, local structure, capacitance characteristics and frequency. As a result, traditional encryption methods can not be applied to images. In this paper we present a method for designing a simple and efficient messy system using a difference in the output sequence. To meet the requirements of image encryption, we create a new coding system for linear and nonlinear structures based on the generation of a new key based on chaotic maps.
The design uses a kind of chaotic maps including the Chebyshev 1D map, depending on the parameters, for a good random appearance. The output is a test in several measurements, including the complexity of th
... Show MoreWith the development of high-speed network technologies, there has been a recent rise in the transfer of significant amounts of sensitive data across the Internet and other open channels. The data will be encrypted using the same key for both Triple Data Encryption Standard (TDES) and Advanced Encryption Standard (AES), with block cipher modes called cipher Block Chaining (CBC) and Electronic CodeBook (ECB). Block ciphers are often used for secure data storage in fixed hard drives, portable devices, and safe network data transport. Therefore, to assess the security of the encryption method, it is necessary to become familiar with and evaluate the algorithms of cryptographic systems. Block cipher users need to be sure that the ciphers the
... Show Moreيعتقد البعض ان مفهوم العلم يعني الآلات والاجهزة العلمية (تقنيات التعليم) وهي لا تختلف عن مفهوم تكنولوجيا المعلومات , ويعد هذا الاعتقاد خاطئ , لان العلم هو بناء المعرفة العلمية المنظمة والتي يتم التوصل اليها عن طريق البحث العلمي , اما تكنولوجيا المعلومات فهي "التطبيقات العملية للمعرفة العلمية في مختلف المجالات ذات الفائدة المباشرة بحياة الانسان, او هي النواحي التطبيقية للعلم وما يرتبط بها من آلات واجهزة".
In this research, we study the changing structural properties of ZnO with changing annealing temp., in the range (473-773)K prepared by chemical bath deposition method at temp. (353)K, where deposited on glasses substrates at thickness (500±25)nm, the investigation of (XRD) indicates that the (ZnO) films are polycrystalline type of Hexagonal.
The results of the measuring of each sample from grain size, microstrain, dislocation density, integral breadth, shape factor and texture coefficient, show that annealing process leads to increase the grain size (26.74-57.96)nm, and decrease microstrain (0.130-0.01478), dislocation density (1.398-0.297)*1015
... Show MoreIn this study, mixing of zinc oxide (ZnO) nanoparticles with iron oxide(Fe2O3) at (0, 0.1, 0.3, 0.5 and 1)%wt., are deposited on glass substrates by pulsed laser deposition (PLD) technique for study characterization ZnO:Fe2O3 as solar cell electrode. The profound effect of mixed film on the structural and optical of ZnO: Fe2O3 thin films was observed. Meanwhile, the films have polycrystalline Hexagonal structures for ZnO, Rhombohedra and cubic structure for Fe2O3, and as indicated by the X-ray diffraction patterns of the films. The mean crystallite size of ZnO increase with increasing mixed ratio. The direct energy
... Show More