research centers


Search results: Found 10

Listing 1 - 10 of 10
Sort by

Article
Use the Multiplicative Cyclic Group to Generate Pseudo Random Digital Sequences
استخدام الزمرة الضربية الدوارة لتوليد متتابعات رقمية شبه عشوائية

Author: Faez Hassan Ali
Journal: Al-Rafidain University College For Sciences مجلة كلية الرافدين الجامعة للعلوم ISSN: 16816870 Year: 2006 Issue: 20 Pages: 122-135
Publisher: Rafidain University College كلية الرافدين الجامعة

Loading...
Loading...
Abstract

The Multiplicative Cyclic Group [3] is one of the algebraic systems which can be used to generate a various long period digital sequences with elements ranged 0..m-1, where mZ+, m  2 that’s done by using one (or more than one) primitive element(s) of the group. The generated sequences can be used in Stream Cipher Systems. In this paper, we introduce the mathematical process to generate a sequence from one generator of The Multiplicative Cyclic Group (MCG). The generated sequence may have no good statistical properties, so we suggest a two generators sequence. The two generators with some initial variables (keys) make a unit called MCG unit. A number of MCG units are combined with each other by a combining logical function to get MCG system. This paper includes some algorithms to describe the mentioned process and some tables describe the tests results of the generated sequences.

تعتبر الزمرة الضربية الدوارة Multiplicative Cyclic Group (MCG) من الأنظمة الجبرية التي يمكن استخدامها لتوليد متتابعات رقمية متنوعة بمدى يتراوح 0..m-1,، mZ+,، m  2، هذه المتتابعات ذات دورات عالية معلومة، وهذا يتم من خلال واحد (او اكثر) من العناصر المولدة للزمرة. هكذا متتابعات يمكن ان تستخدم في أنظمة التشفير الانسيابي. في هذا البحث، نقدم العملية الرياضية لتوليد متتابعات باستخدام عنصر مولد واحد، هذه المتتابعات ليس لها خواص إحصائية جيدة لذلك تم اقتراح توليد متتابعات باستخدام عنصرين مولدة. العنصرين المولدة مع متغيرات (مفاتيح) ابتدائية تكون وحدة تدعى MCGU. عدد من وحدات MCGU تركب مع بعضها باستخدام دالة منطقية للحصول على نظام MCGS. لقد تضمن هذا البحث بعض الخوارزميات التي توضح العملية الرياضية المذكورة مع بعض الجداول التي توضح نتائج الاختبارات على المتتابعات المولدة.


Article
High Efficient Sequences Generate from Developed MCG Generator
توليد متتابعة عالية الكفاءة من مولد الزمرة الضربية الدوارة المطورة

Author: Faez Hassan Ali Al-Azawi
Journal: Al-Rafidain University College For Sciences مجلة كلية الرافدين الجامعة للعلوم ISSN: 16816870 Year: 2009 Issue: 25 Pages: 169-182
Publisher: Rafidain University College كلية الرافدين الجامعة

Loading...
Loading...
Abstract

It has been before using the mathematical system – the Multipicative Cyclic Group (MCG) - to construct the MCG unit, which is a base unit of MCG systems. In this paper we develop the MCG unit to gain random digital sequences with high efficiency to be used in Stream Cipher Systems. The basic criteria of efficiency are applied to test the digital sequence results from the system which is combined from the proposed unit.

لقد سبق وان تم استخدام النظام الرياضي-الزمرة الضربية الدوارة Multiplicative Cyclic Group (MCG)-لإنشاء وحدة (MCG)، وهي الوحدة الأساسية لمنظومة MCG. في هذا البحث سوف نقوم بتطوير وحدة MCG للحصول على متتابعات رقمية عشوائية ذات كفاءة عالية تستخدم في نظم التشفير الانسيابي. لقد تم تطبيق مقاييس الكفاءة الأساسية على المتتابعات الرقمية الناتجة من أنظمة مركبة من الوحدات الجديدة المطورة لمعرفة مدى كفاءة الوحدة الجديدة.


Article
Robust and Efficient Dynamic Stream Cipher Cryptosystem

Authors: Abdullah Ayad Ghazi --- Faez Hassan Ali
Journal: Iraqi Journal of Science المجلة العراقية للعلوم ISSN: 00672904/23121637 Year: 2018 Volume: 59 Issue: 2C Pages: 1105-1114
Publisher: Baghdad University جامعة بغداد

Loading...
Loading...
Abstract

In this paper a new technique based on dynamic stream cipher algorithm is introduced. The mathematical model of dynamic stream cipher algorithm is based on the idea of changing the structure of the combined Linear Feedback Shift Registers (LFSR's) with each change in basic and message keys to get more complicated encryption algorithm, and this is done by use a bank of LFSR's stored in protected file and we select a collection of LFSR's randomly that are used in algorithm to generate the encryption (decryption) key. We implement Basic Efficient Criteria on the suggested Key Generator (KG) to test the output key results. The results of applying BEC prove the robustness and efficiency of the proposed stream cipher cryptosystem


Article
Theoretical Estimation of the Autocorrelation Postulate for Nonlinear Sequences Generated from Threshold
التخمين النظري لفرضية الارتباط الذاتي للمتتابعات غير الخطية المولدة من مولد ثريشولد

Authors: Faez Hassan Ali --- Sabah Mahmood Shaker
Journal: journal of the college of basic education مجلة كلية التربية الاساسية ISSN: 18157467(print) 27068536(online) Year: 2012 Volume: 18 Issue: 75 / ملحق Pages: 183-197
Publisher: Al-Mustansyriah University الجامعة المستنصرية

Loading...
Loading...
Abstract

The Randomness is one of the basic criterions to measure Key Generator Efficiency. The key generator depends basically on Linear FeedBack Shift Register which is considered as one of the basic units of Stream Cipher Systems. In this paper, the autocorrelation postulate, which one of the basis of Randomness criteria, is calculated theoretically for non-linear key generator before it be implemented or constructed (software or hardware), this procedure save time and costs. A nonlinear key generator is chosen to apply the theoretical studies, this key generator is the Threshold.

تعتبر العشوائية (Randomness) من أهم مقاييس الكفاءة الأساسية لقياس كفاءة مولدات المفاتيح. مولد المفاتيح يعتمد بشكل أساسي على المسجل الزاحف الخطي ذو التغذية الخلفية (Linear Feedback Shift Register) كونه أحد الوحدات الأساسية لنظم التشفير الانسيابي (Stream Cipher Systems). في هذا البحث، تم حساب خاصية الارتباط الذاتي، باعتبارها احد أسس العشوائية، لمتتابعة مولدة من مولد مفاتيح غير خطي نظريا قبل بناء او تنفيذ النظام عمليا (برمجيا او مادياً)، وهذا الأسلوب سوف يوفر الوقت والجهد والكلفة لمصمم الشفرة. تم اختيار مولد مفاتيح غير خطي لتطبيق الدراسة النظرية للبحث هي منظومة ثريشولد (Threshold).

Keywords


Article
New Improved Heuristic Method for Solving Travelling Salesman Problem

Authors: Faez Hassan Ali --- Sajad Majeed Jassim
Journal: Iraqi Journal of Science المجلة العراقية للعلوم ISSN: 00672904/23121637 Year: 2018 Volume: 59 Issue: 4C Pages: 2289-2300
Publisher: Baghdad University جامعة بغداد

Loading...
Loading...
Abstract

In this paper we will investigate some Heuristic methods to solve travelling salesman problem. The discussed methods are Minimizing Distance Method (MDM), Branch and Bound Method (BABM), Tree Type Heuristic Method (TTHM) and Greedy Method (GRM). The weak points of MDM are manipulated in this paper. The Improved MDM (IMDM) gives better results than classical MDM, and other discussed methods, while the GRM gives best time for 5≤ n ≤500, where n is the number of visited cities.


Article
Design of New Dynamic Cryptosystem with High Software Protection

Authors: Abdullah Ayad Ghazi --- Faez Hassan Ali
Journal: Iraqi Journal of Science المجلة العراقية للعلوم ISSN: 00672904/23121637 Year: 2018 Volume: 59 Issue: 4C Pages: 2301-2309
Publisher: Baghdad University جامعة بغداد

Loading...
Loading...
Abstract

generator with good random statistical properties is introduced. The results of the statistical tests, initialization and the components of the proposed generator of the suggested cryptosystem are detailed in [1]. The proposed cryptosystem called Robust and Efficient Dynamic Stream Cipher Cryptosystem (RDSCC). The dynamic here means the generator of RDSCC has unfixed construction; the design will be changed as the seed (initial) key changed. The generator will construct itself by barrows number of Linear Feedback Shift Registers (LFSR’s), randomly, stored in protected bank file. The RDSCC is constructed to be flexible to encrypt (decrypt) different types of data; like message text and image data efficiently. Also we suggest using software protection for RDSCC which is represented by partitioned the cryptosystem file into two parts, each one saved in different memories to keep it in save from any attack. Lastly, the proposed generator and the cryptosystem are implemented practically and the main interfaces of the two programs are shown in this paper. These interfaces are programmed with GUI MATLAB2017.

Keywords


Article
Design of New Dynamic Cryptosystem with High Software Protection

Authors: Abdullah Ayad Ghazi --- Faez Hassan Ali
Journal: Iraqi Journal of Science المجلة العراقية للعلوم ISSN: 00672904/23121637 Year: 2018 Volume: 59 Issue: 4C Pages: 2301-2309
Publisher: Baghdad University جامعة بغداد

Loading...
Loading...
Abstract

generator with good random statistical properties is introduced. The results of the statistical tests, initialization and the components of the proposed generator of the suggested cryptosystem are detailed in [1]. The proposed cryptosystem called Robust and Efficient Dynamic Stream Cipher Cryptosystem (RDSCC). The dynamic here means the generator of RDSCC has unfixed construction; the design will be changed as the seed (initial) key changed. The generator will construct itself by barrows number of Linear Feedback Shift Registers (LFSR’s), randomly, stored in protected bank file. The RDSCC is constructed to be flexible to encrypt (decrypt) different types of data; like message text and image data efficiently. Also we suggest using software protection for RDSCC which is represented by partitioned the cryptosystem file into two parts, each one saved in different memories to keep it in save from any attack. Lastly, the proposed generator and the cryptosystem are implemented practically and the main interfaces of the two programs are shown in this paper. These interfaces are programmed with GUI MATLAB2017.

Keywords


Article
Using Travelling Salesman Principle to Evaluate the Minimum Total Cost of the Iraqi Cities

Authors: Sajjad Majeed Jasim --- Faez Hassan Ali
Journal: Ibn Al-Haitham Journal For Pure And Applied Science مجلة ابن الهيثم للعلوم الصرفة والتطبيقية ISSN: 16094042 Year: 2019 Volume: 32 Issue: 3 Pages: 95-108
Publisher: Baghdad University جامعة بغداد

Loading...
Loading...
Abstract

The traveling salesman problem (TSP) is a well-known and important combinatorialoptimization problem. The goal is to find the shortest tour that visits each city in a given listexactly once and then returns to the starting city. In this paper we exploit the TSP to evaluatethe minimum total cost (distance or time) for Iraqi cities. So two main methods areinvestigated to solve this problem; these methods are; Dynamic Programming (DP) andBranch and Bound Technique (BABT). For the BABT, more than one lower and upperbounds are be derived to gain the best one. The results of BABT are completely identical toDP, with less time for number of cities (n), 5 ≤ n ≤ 25. These results proof the efficiency ofBABT compared with some good heuristic methods. We are suggesting some additionaltechniques to improve the computation time of BABT for n ≤ 80.


Article
Solving Linear Equations Systems Using Genetic Algorithm
حل نظم المعادلات الخطية باستخدام الخوارزمية الجينية

Authors: Ahmed Shawki Jaber Al_Asady احمد شوقي جابر --- Faez Hassan Ali Al_Azawi فائز حسن علي
Journal: AL-MANSOUR JOURNAL مجلة المنصور ISSN: 18196489 Year: 2010 Issue: 14(2) Pages: 143-159
Publisher: Private Mansour college كلية المنصور الاهلية

Loading...
Loading...
Abstract

Genetic Algorithms (GA's) are a class of optimization algorithms. GA’s attempts to solve problems through modeling a simplified version of genetic process. There are many problems for which a GA approach is useful.This paper aims to solve Linear Equations System (LES) for any number of variables using the GA. The application of this paper represented by cryptanalysis application, this done by attacking stream cipher systems, choosing one Linear Feedback Shift Register (LFSR), since its considered as a basic unit of stream cipher systems, in the performance of GA. The application divided into two stages, first, constructing LES’s for the LFSR, and the second, is attacking the variables of LES’s which they are also the initial key values the of LFSR.

الخوارزميات الجينية (Genetic Algorithms) تمثل مجموعة الخوارزميات الامثلية. الخوارزمية الجينية تحاول حل المسائل من خلال بناء نموذج جيل بسيط من العملية الجينية. لقد نجحت الخوارزمية الجينية في حل الكثير من المسائل. وبالطبع فان هذه الخوارزمية ستكون غير تقليدية في حالة كون تحليل الشفرة هو احد هذه المسائل.هذا البحث يهدف إلى حل نظم المعادلات الخطية لأي عدد من المتغيرات باستخدام الخوارزمية الجينية. إن مجال تطبيق هذا البحث هو تحليل الشفرة (Cryptanalysis)، وهذا يتم من خلال مهاجمة نظم التشفير الانسيابي (Stream Cipher Systems)، باختيار مسجل زاحف خطي ذو تغذية مرتدة (Linear Feedback Shift Register)، باعتباره الوحدة الأساسية التي تدخل في بناء نظم التشفير الانسيابي، معتمدين على انجاز الخوارزمية الجينية. التطبيق في هذا البحث يتم في مرحلتين، الأولى تتمثل ببناء نظام معادلات خطية من مخرجات المسجل الزاحف، والمرحلة الثانية هي حل نظام المعادلات الخطية ومعرفة قيم المجاهيل والتي تمثل قيم المفتاح الابتدائي للمسجل الزاحف.

Keywords


Article
Analyzing Cryptosystems by Using Artificial Intelligence

Authors: Ahmed Ayyoub Yousif --- Mohammed G. S. Al-Safi --- Faez Hassan Ali
Journal: Al-Nahrain Journal of Science مجلة النهرين للعلوم ISSN: (print)26635453,(online)26635461 Year: 2018 Volume: 00 Issue: 1 Pages: 100-108
Publisher: Al-Nahrain University جامعة النهرين

Loading...
Loading...
Abstract

This paper aims to apply the Bees Algorithm for solving system of equations. The solving System of Equations may be linear or nonlinear for a number of unknowns. As an application of System of Equations, we can implement cryptanalysis attack algorithms on stream cipher systems using plaintext attack (or part from it). We consider the Geffe System (which has nonlinear combining function) to be our study case, which is depend on set of Linear Feedback Shift Registers, as a model of stream cipher systems, in the performance of Bees Algorithm by solving System of Equations for any number of variables of the output of Linear Feedback Shift Registers.The application divided into two stages, first, constructing System of Equations for the suggested cryptosystem, and the second, is attacking the variables of System of Equations which they are also represent the initial key values of the combined of Linear Feedback Shift Registers.

Listing 1 - 10 of 10
Sort by
Narrow your search

Resource type

article (10)


Language

English (9)

Arabic (1)


Year
From To Submit

2019 (1)

2018 (5)

2012 (1)

2010 (1)

2009 (1)

More...