HANEEN ALI - Academia.edu (original) (raw)

Papers by HANEEN ALI

Research paper thumbnail of Ministry of Higher Education and

To the one whom God made Paradise under her feet, to the one to whom God has bestowed high honor ... more To the one whom God made Paradise under her feet, to the one to whom God has bestowed high honor and invincible glory, whose heart embraced me before her hand and made adversity easy for me with her supplications, to the hidden hand that was removed by thorns, and who endured every moment of pain that I went through. To you, my most precious thing (my mother, may God protect her and grant her long life). her age.) To the dear one, whose name I carry with pride, to the one whom God has crowned with prestige and reverence, to my great inspiration, my first supporter, and my steadfast support, the one who extended his arm like the earth, and the one who was a source of strength and security on every path I feared, to the one who taught me that the world is a struggle and its weapon is knowledge and knowledge, to the one who instilled in my soul noble morals, my first supporter. My pride and pride (my father, may God prolong his life). To those who are happy with my success and to those who smoothed the pitfalls of my path with their prayers and love for the best days and the apple of my eye (my brothers, my sisters). Thanks and appreciation Praise be to God, Lord of the Worlds, and prayers and peace be upon the best of creation and the messengers, Muhammad and his good, pure, and chosen God. In the end, I can only extend my sincere thanks and gratitude to the distinguished professors in the College of Basic Education, Mathematics Department, especially the head of the department, (Dr. Ahmed Sabah). I would also like to extend my great thanks and gratitude to my esteemed professor. And the esteemed (Mrs. Sahab Mohsen Abboud) for the kind care, compassion, and sincere scientific spirit they showed me, and the sound guidance and advice they provided me with valuable and continuous comments... Therefore, I pray for their success, goodness, and well-being. I extend my thanks, appreciation and love to all our distinguished professors in the College of Basic Education, Department of Mathematics, who paved the path of science and knowledge for us. Finally, I must say a word of thanks, love and gratitude to everyone who supported me, and to everyone who supported me in my work and gave me the ability and determination to achieve my goal, even if it was with a single word of encouragement, and to those whose names I missed, may God reward them with the best reward. Research summary This research aims to present a brief summary of the study of number theory in cryptography and its types Cryptography is the science that uses mathematics to encrypt and decrypt data for the purpose of protecting it from hacking and theft, in addition to an algorithm Encryption is a mathematical function used in the process of encryption and decryption, and thus this is the goal The research aims to shed light on the relationship of number theory in cryptography and the importance of the role of mathematics in its form, In general, number theory in particular in encrypting and protecting data and information between two parties is considered Number theory is the backbone of the encryption process, as no text can be encrypted without the use of number theory Because the encryption process is a practical mathematical application of number theory systems, theories, and equations This research presents a study of the basic concepts of number theory. Such as divisibility, its algorithm, its properties, and prime numbers that play an important role in RSA encryption. We also obtained theorems and theories directly related to encryption. Such as the Euler and Fermat theorems and their applications, which help us calculate cryptographic equations and choose the most appropriate prime numbers in addition to the Chinese remainder. The problem of the discrete logarithm was also reviewed. The goal is The main objective of this research is to present encryption methods and algorithms and consider the role of theory The numbers in data encryption and presentation of its applications, in addition to presenting the protocol for the method of exchanging the key between two people for both Diffie Hellman and the RSA method, in addition to the Al-Jamal method, and we reviewed a group of examples of them. We also explained how a third person hacker tries to steal information, how to carry out this hack, and also the method of repelling this type of hack. Ensuring perfect security for the conversation Contents The verse

Research paper thumbnail of Ministry of Higher Education and

To the one whom God made Paradise under her feet, to the one to whom God has bestowed high honor ... more To the one whom God made Paradise under her feet, to the one to whom God has bestowed high honor and invincible glory, whose heart embraced me before her hand and made adversity easy for me with her supplications, to the hidden hand that was removed by thorns, and who endured every moment of pain that I went through. To you, my most precious thing (my mother, may God protect her and grant her long life). her age.) To the dear one, whose name I carry with pride, to the one whom God has crowned with prestige and reverence, to my great inspiration, my first supporter, and my steadfast support, the one who extended his arm like the earth, and the one who was a source of strength and security on every path I feared, to the one who taught me that the world is a struggle and its weapon is knowledge and knowledge, to the one who instilled in my soul noble morals, my first supporter. My pride and pride (my father, may God prolong his life). To those who are happy with my success and to those who smoothed the pitfalls of my path with their prayers and love for the best days and the apple of my eye (my brothers, my sisters). Thanks and appreciation Praise be to God, Lord of the Worlds, and prayers and peace be upon the best of creation and the messengers, Muhammad and his good, pure, and chosen God. In the end, I can only extend my sincere thanks and gratitude to the distinguished professors in the College of Basic Education, Mathematics Department, especially the head of the department, (Dr. Ahmed Sabah). I would also like to extend my great thanks and gratitude to my esteemed professor. And the esteemed (Mrs. Sahab Mohsen Abboud) for the kind care, compassion, and sincere scientific spirit they showed me, and the sound guidance and advice they provided me with valuable and continuous comments... Therefore, I pray for their success, goodness, and well-being. I extend my thanks, appreciation and love to all our distinguished professors in the College of Basic Education, Department of Mathematics, who paved the path of science and knowledge for us. Finally, I must say a word of thanks, love and gratitude to everyone who supported me, and to everyone who supported me in my work and gave me the ability and determination to achieve my goal, even if it was with a single word of encouragement, and to those whose names I missed, may God reward them with the best reward. Research summary This research aims to present a brief summary of the study of number theory in cryptography and its types Cryptography is the science that uses mathematics to encrypt and decrypt data for the purpose of protecting it from hacking and theft, in addition to an algorithm Encryption is a mathematical function used in the process of encryption and decryption, and thus this is the goal The research aims to shed light on the relationship of number theory in cryptography and the importance of the role of mathematics in its form, In general, number theory in particular in encrypting and protecting data and information between two parties is considered Number theory is the backbone of the encryption process, as no text can be encrypted without the use of number theory Because the encryption process is a practical mathematical application of number theory systems, theories, and equations This research presents a study of the basic concepts of number theory. Such as divisibility, its algorithm, its properties, and prime numbers that play an important role in RSA encryption. We also obtained theorems and theories directly related to encryption. Such as the Euler and Fermat theorems and their applications, which help us calculate cryptographic equations and choose the most appropriate prime numbers in addition to the Chinese remainder. The problem of the discrete logarithm was also reviewed. The goal is The main objective of this research is to present encryption methods and algorithms and consider the role of theory The numbers in data encryption and presentation of its applications, in addition to presenting the protocol for the method of exchanging the key between two people for both Diffie Hellman and the RSA method, in addition to the Al-Jamal method, and we reviewed a group of examples of them. We also explained how a third person hacker tries to steal information, how to carry out this hack, and also the method of repelling this type of hack. Ensuring perfect security for the conversation Contents The verse

Research paper thumbnail of Ministry of Higher Education and

To the one whom God made Paradise under her feet, to the one to whom God has bestowed high honor ... more To the one whom God made Paradise under her feet, to the one to whom God has bestowed high honor and invincible glory, whose heart embraced me before her hand and made adversity easy for me with her supplications, to the hidden hand that was removed by thorns, and who endured every moment of pain that I went through. To you, my most precious thing (my mother, may God protect her and grant her long life). her age.) To the dear one, whose name I carry with pride, to the one whom God has crowned with prestige and reverence, to my great inspiration, my first supporter, and my steadfast support, the one who extended his arm like the earth, and the one who was a source of strength and security on every path I feared, to the one who taught me that the world is a struggle and its weapon is knowledge and knowledge, to the one who instilled in my soul noble morals, my first supporter. My pride and pride (my father, may God prolong his life). To those who are happy with my success and to those who smoothed the pitfalls of my path with their prayers and love for the best days and the apple of my eye (my brothers, my sisters). Thanks and appreciation Praise be to God, Lord of the Worlds, and prayers and peace be upon the best of creation and the messengers, Muhammad and his good, pure, and chosen God. In the end, I can only extend my sincere thanks and gratitude to the distinguished professors in the College of Basic Education, Mathematics Department, especially the head of the department, (Dr. Ahmed Sabah). I would also like to extend my great thanks and gratitude to my esteemed professor. And the esteemed (Mrs. Sahab Mohsen Abboud) for the kind care, compassion, and sincere scientific spirit they showed me, and the sound guidance and advice they provided me with valuable and continuous comments... Therefore, I pray for their success, goodness, and well-being. I extend my thanks, appreciation and love to all our distinguished professors in the College of Basic Education, Department of Mathematics, who paved the path of science and knowledge for us. Finally, I must say a word of thanks, love and gratitude to everyone who supported me, and to everyone who supported me in my work and gave me the ability and determination to achieve my goal, even if it was with a single word of encouragement, and to those whose names I missed, may God reward them with the best reward. Research summary This research aims to present a brief summary of the study of number theory in cryptography and its types Cryptography is the science that uses mathematics to encrypt and decrypt data for the purpose of protecting it from hacking and theft, in addition to an algorithm Encryption is a mathematical function used in the process of encryption and decryption, and thus this is the goal The research aims to shed light on the relationship of number theory in cryptography and the importance of the role of mathematics in its form, In general, number theory in particular in encrypting and protecting data and information between two parties is considered Number theory is the backbone of the encryption process, as no text can be encrypted without the use of number theory Because the encryption process is a practical mathematical application of number theory systems, theories, and equations This research presents a study of the basic concepts of number theory. Such as divisibility, its algorithm, its properties, and prime numbers that play an important role in RSA encryption. We also obtained theorems and theories directly related to encryption. Such as the Euler and Fermat theorems and their applications, which help us calculate cryptographic equations and choose the most appropriate prime numbers in addition to the Chinese remainder. The problem of the discrete logarithm was also reviewed. The goal is The main objective of this research is to present encryption methods and algorithms and consider the role of theory The numbers in data encryption and presentation of its applications, in addition to presenting the protocol for the method of exchanging the key between two people for both Diffie Hellman and the RSA method, in addition to the Al-Jamal method, and we reviewed a group of examples of them. We also explained how a third person hacker tries to steal information, how to carry out this hack, and also the method of repelling this type of hack. Ensuring perfect security for the conversation Contents The verse

Research paper thumbnail of Ministry of Higher Education and

To the one whom God made Paradise under her feet, to the one to whom God has bestowed high honor ... more To the one whom God made Paradise under her feet, to the one to whom God has bestowed high honor and invincible glory, whose heart embraced me before her hand and made adversity easy for me with her supplications, to the hidden hand that was removed by thorns, and who endured every moment of pain that I went through. To you, my most precious thing (my mother, may God protect her and grant her long life). her age.) To the dear one, whose name I carry with pride, to the one whom God has crowned with prestige and reverence, to my great inspiration, my first supporter, and my steadfast support, the one who extended his arm like the earth, and the one who was a source of strength and security on every path I feared, to the one who taught me that the world is a struggle and its weapon is knowledge and knowledge, to the one who instilled in my soul noble morals, my first supporter. My pride and pride (my father, may God prolong his life). To those who are happy with my success and to those who smoothed the pitfalls of my path with their prayers and love for the best days and the apple of my eye (my brothers, my sisters). Thanks and appreciation Praise be to God, Lord of the Worlds, and prayers and peace be upon the best of creation and the messengers, Muhammad and his good, pure, and chosen God. In the end, I can only extend my sincere thanks and gratitude to the distinguished professors in the College of Basic Education, Mathematics Department, especially the head of the department, (Dr. Ahmed Sabah). I would also like to extend my great thanks and gratitude to my esteemed professor. And the esteemed (Mrs. Sahab Mohsen Abboud) for the kind care, compassion, and sincere scientific spirit they showed me, and the sound guidance and advice they provided me with valuable and continuous comments... Therefore, I pray for their success, goodness, and well-being. I extend my thanks, appreciation and love to all our distinguished professors in the College of Basic Education, Department of Mathematics, who paved the path of science and knowledge for us. Finally, I must say a word of thanks, love and gratitude to everyone who supported me, and to everyone who supported me in my work and gave me the ability and determination to achieve my goal, even if it was with a single word of encouragement, and to those whose names I missed, may God reward them with the best reward. Research summary This research aims to present a brief summary of the study of number theory in cryptography and its types Cryptography is the science that uses mathematics to encrypt and decrypt data for the purpose of protecting it from hacking and theft, in addition to an algorithm Encryption is a mathematical function used in the process of encryption and decryption, and thus this is the goal The research aims to shed light on the relationship of number theory in cryptography and the importance of the role of mathematics in its form, In general, number theory in particular in encrypting and protecting data and information between two parties is considered Number theory is the backbone of the encryption process, as no text can be encrypted without the use of number theory Because the encryption process is a practical mathematical application of number theory systems, theories, and equations This research presents a study of the basic concepts of number theory. Such as divisibility, its algorithm, its properties, and prime numbers that play an important role in RSA encryption. We also obtained theorems and theories directly related to encryption. Such as the Euler and Fermat theorems and their applications, which help us calculate cryptographic equations and choose the most appropriate prime numbers in addition to the Chinese remainder. The problem of the discrete logarithm was also reviewed. The goal is The main objective of this research is to present encryption methods and algorithms and consider the role of theory The numbers in data encryption and presentation of its applications, in addition to presenting the protocol for the method of exchanging the key between two people for both Diffie Hellman and the RSA method, in addition to the Al-Jamal method, and we reviewed a group of examples of them. We also explained how a third person hacker tries to steal information, how to carry out this hack, and also the method of repelling this type of hack. Ensuring perfect security for the conversation Contents The verse