مهندسی دریا
Farnoosh Jahanbakhshi; Mohammad Reza Noorimehr; Mohammad Esmaeildoust
Abstract
Abstract- With growth of technology, the needs for data and information security over communication channels are necessary. One of the most important issues is the establishment of information security in marine communications. The RSA encryption algorithm is one of the most popular and most asymmetric ...
Read More
Abstract- With growth of technology, the needs for data and information security over communication channels are necessary. One of the most important issues is the establishment of information security in marine communications. The RSA encryption algorithm is one of the most popular and most asymmetric algorithms used for secure data transfer. In the RSA encryption system, due to the very long key length, the encryption and decryption step speeds decrease, so it needs to improve its speed. One of the improving ways of RSA is RPrime RSA that includes the highest decryption of speed to RSA. In this paper, the encryption and decryption speed of RPrime RSA algorithm is improved using efficient residual number system. The result of implementation and comparison shows that the proposed method has an average of %22 and %36 improved at the encryption and decryption speed than the RPrime RSA algorithm.
مهندسی دریا
Elham Matori; Mohammad Esmaeildoust
Abstract
The PRINCE lightweight cryptographic algorithm was introduced as a template in 2012. In this paper, we intend to change the structure of the PRINCE encryption algorithm and use a Dynamic S-BOX to increase the complexity and security of the encryption process. In order to show the efficiency of the proposed ...
Read More
The PRINCE lightweight cryptographic algorithm was introduced as a template in 2012. In this paper, we intend to change the structure of the PRINCE encryption algorithm and use a Dynamic S-BOX to increase the complexity and security of the encryption process. In order to show the efficiency of the proposed structure, differential analysis is performed on the algorithm as well as analysis on the optimal number of revolutions for the algorithm. Analyzes and implementations show that the cryptographic structure is more complex. Despite the slight increase in memory and execution time of the algorithm, compared to the PRINCE encryption algorithm with fixed S-BOX, it has more strength against differential attack and as a result, the security in the improved algorithm has increased. Stronger also increases security.
مهندسی دریا
Javad Ahsan; Mohammad Esmaeildoust; Amer Kaabi; vahid Zareii
Abstract
The residue number system has a parallel computational structure with carry-free operations and is widely used in cases such as digital signal processing, cryptography, design of FIR filters, etc. In this paper we design an efficient reverse converter for the four-moduli set {〖2^(n-2)+1,2〗^(n-3)-1,2^(n-3)+1,2^(n-5)-1}. ...
Read More
The residue number system has a parallel computational structure with carry-free operations and is widely used in cases such as digital signal processing, cryptography, design of FIR filters, etc. In this paper we design an efficient reverse converter for the four-moduli set {〖2^(n-2)+1,2〗^(n-3)-1,2^(n-3)+1,2^(n-5)-1}. In this moduli set, due to the selection of well-formed and balanced modulus, it leads to optimal hardware implementation, with minimum area utilization and minimum time delay. The main advantage of this design is the use of a ROM free and adder base hardware structure. The proposed moduli set are relatively prime to most existed moduli sets in literature and as results it can be employed in the implementation of Montgomery multiplication. The proposed reverse converter has a two-level structure. In the first level, the Chinese remainder theorem is used, and in the second level, the Mixed-radix conversion is used to calculate the final weighted number. The results of computational theory show low time latency and minimal hardware space in this design.
علوم انسانی دریا
Mohammad Amin Kouhbor; Homayoun Yousefi; Mohammad Esmaeil Doust; Arash Amraei
Abstract
The purpose of this present study was to identify the factors affecting the development of the maritime tourism industry in line with the economic growth of the ports of Khorramshahr and Abadan and its effect on attracting tourists in the Arvand Free Zone. On the other hand, citing the research ...
Read More
The purpose of this present study was to identify the factors affecting the development of the maritime tourism industry in line with the economic growth of the ports of Khorramshahr and Abadan and its effect on attracting tourists in the Arvand Free Zone. On the other hand, citing the research objective, ranking the factors affecting the development of the maritime tourism industry will increase the income of the ports and maritime organizations of Abadan and Khorramshahr, Arvand Free Zone, as well as creating job opportunities in Khuzestan Province. The method of this research is applied in terms of its purpose and in terms of descriptive-survey nature which is conducted by interviewing, observing, studying, and ... with a deductive approach to identify influential factors. On the other hand, in the quantitative part of the research, the analysis has been carried out. Data were analyzed by using SPSS and LISREL software based on the T-test and structural equations model. Based on the results, natural variables of other variables were more effective than those with a T-statistic of 14.84 and an impact factor, of 0.85, which is a significant amount. This value is considered strong in terms of the severity of the effect since it is more than 70%. On the other hand, the variable of political factors, with the value of t statistic, is 9.71, the coefficient of influence is 0.59, and the effect of average intensity has the least effect on attracting tourists to the Arvand Free Zone.
The method of this research is applied in terms of its purpose and in terms of descriptive-survey nature which is conducted by interviewing, observing, studying and ... with a deductive approach to identify influential factors. On the other hand, in the quantitative part of the research, the analysis has been carried out. Data were analyzed by using SPSS and LISREL software based on the T-test and structural equations model. Based on the results, natural variables of other variables were more effective than those with T-statistic 14.84 and impact factor, 0.85, has a significant amount. This value is considered strong in terms of the severity of the effect since it is more than 70%. On the other hand, the variable of political factors, with the value of t statistic, is 9.71, and the coefficient of influence is 0.59, and the effect of average intensity has the least effect on attracting tourists in Arvand Free Zone.
مهندسی دریا
Masoumeh beitabdollah; Mohammad Esmaeildoust; Amer Kaabi
Abstract
With growth of Technology, With growth of technology, the needs for data and information security over communication channels are necessary. Providing information security in marine environment includes communication between ships and also ships with ground station are one of the most important issues ...
Read More
With growth of Technology, With growth of technology, the needs for data and information security over communication channels are necessary. Providing information security in marine environment includes communication between ships and also ships with ground station are one of the most important issues in information security. In order to provide Confidentiality, symmetric key cryptography algorithms such DES, 3DES, IDEA, RC6, Serpent and AES are presented by researchers. Different reports in literature are presented by researchers in order to compare the performance of these algorithms. Despite various considerations, the needs for deep comparison of these algorithms are needed. Therefore in this paper, deep consideration and comparison in the points of architecture, flexibility, security and speed of these algorithms are done. Based on the achieved results, the appropriate algorithm can be employed based on required flexibility, speed or desired levels of security. The result of implementation and comparison shows the advantages of AES algorithm in provided security and RC6 in speed of execution.