Preferred Language
Articles
/
jBZBn4oBVTCNdQwC46HU
Enhanced Multistage RSA Encryption Model

Scopus Crossref
View Publication
Publication Date
Fri Aug 02 2024
Journal Name
Quantum Studies: Mathematics And Foundations
Implementation of a modified noise-free and noisy multistage quantum cryptography protocol using QISKIT

Classical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. T

... Show More
Crossref (1)
Scopus Clarivate Crossref
View Publication
Publication Date
Fri Mar 15 2019
Journal Name
Spe Middle East Oil And Gas Show And Conference
Evaluation of the Potentials for Adapting the Multistage Hydraulic Fracturing Technology in Tight Carbonate Reservoir
Abstract<p>Hydraulic fracturing is considered to be a vital cornerstone in decision making of unconventional reservoirs. With an increasing level of development of unconventional reservoirs, many questions have arisen regarding enhancing production performance of tight carbonate reservoirs, especially the evaluation of the potential for adapting multistage hydraulic fracturing technology in tight carbonate reservoirs to attain an economic revenue.</p><p>In this paper we present a feasibility study of multistage fractured horizontal well in typical tight carbonate reservoirs covering different values of permeability. We show that NPV is the suitable objective function for deciding on the optimum number</p> ... Show More
Scopus (24)
Crossref (18)
Scopus Crossref
Publication Date
Wed Feb 08 2023
Journal Name
Iraqi Journal Of Science
DNA Fragmentation in Male Couples of Females with Recurrent Spontaneous Abortions (RSA)

Comet assay Single cell electrophoresis assay (SCGE) is a very sensitive method to determine DNA damage caused by exposure to mutagenic and carcinogenic and environmental agents that effect couples infertility. The aim of project was to evaluate DNA damage in males couples of females with recurrent spontaneous abortions. Forty males couples of females with unexplained recurrent spontaneous abortions and 25 healthy fertile males (control group) were evaluated for semen quality by conventional semen parameters, and alkaline comet assay was applied for the two groups. The results showed that patients male couples of females with RSA had a significant higher DNA damage than in the control group. It was concluded that patients male couples of

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Proposed Hybrid Cryptosystems Based on Modifications of Playfair Cipher and RSA Cryptosystem

Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Wed Aug 11 2021
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
Survey on 3D Content Encryption

<p class="0abstract">The rapidly growing 3D content exchange over the internet makes securing 3D content became a very important issue. The solution for this issue is to encrypting data of 3D content, which included two main parts texture map and 3D models. The standard encryption methods such as AES and DES are not a suitable solution for 3D applications due to the structure of 3D content, which must maintain dimensionality and spatial stability. So, these problems are overcome by using chaotic maps in cryptography, which provide confusion and diffusion by providing uncorrelated numbers and randomness. Various works have been applied in the field of 3D content-encryption based on the chaotic system. This survey will attempt t

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Thu Sep 30 2021
Journal Name
Iraqi Journal Of Science
Playfair with Multi Strata Encryption

     Playfair cipher is a substitution scheme. The classical playfair scheme has a limited matrix size  containing only uppercase letters, so it is prone to hackers and cryptanalysis. To increase the resistance of playfair cipher, a new encipherment and decipherment method is proposed in this work, which depends on the permutation and its inverse, respectively. In addition, a modified  key matrix is utilized, which includes capital and small Alphabets, numbers, and 38 special characters collected from ASCII codes. In the proposed method, both substitution and transposition schemes are used, where the first stratum of the cipher is a substitution by using  key matrix and the second stratum is a transposi

... Show More
Scopus (3)
Scopus Crossref
View Publication Preview PDF
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
Authentication of Digital Video Encryption

The security of multimedia data becoming important spatial data of monitoring systems that contain videos prone to attack or escape via the internet, so to protect these videos used proposed method combined between encryption algorithm and sign algorithm to get on authenticated video. The proposed encryption algorithm applied to secure the video transmission by encrypt it to become unclear. This done by extract video to frames and each frame separate to three frames are Red, Green, and Blue, this frames encrypt by using three different random keys that generated by a function for generating random numbers, as for sign algorithm applied for authentication purpose that enable the receiver from sure of the identity of the sender and provide

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 02 2012
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Publication Date
Thu Nov 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of Multistage and Numerical Discretization Methods for Estimating Parameters in Nonlinear Linear Ordinary Differential Equations Models.

Many of the dynamic processes in different sciences are described by models of differential equations. These models explain the change in the behavior of the studied process over time by linking the behavior of the process under study with its derivatives. These models often contain constant and time-varying parameters that vary according to the nature of the process under study in this We will estimate the constant and time-varying parameters in a sequential method in several stages. In the first stage, the state variables and their derivatives are estimated in the method of penalized splines(p- splines) . In the second stage we use pseudo lest square to estimate constant parameters, For the third stage, the rem

... Show More
Crossref
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
A New Methodology to Find Private Key of RSA Based on Euler Totient Function

          The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key

... Show More
Scopus (7)
Crossref (3)
Scopus Clarivate Crossref
View Publication Preview PDF