{"id":9250,"date":"2025-08-21T12:34:49","date_gmt":"2025-08-21T09:34:49","guid":{"rendered":"https:\/\/en.csw.uobaghdad.edu.iq\/?p=9250"},"modified":"2025-08-25T10:16:03","modified_gmt":"2025-08-25T07:16:03","slug":"a-thesis-in-the-college-of-science-for-women-discussing-results-on-number-theory-via-group-theory-with-application-in-cryptography","status":"publish","type":"post","link":"https:\/\/en.csw.uobaghdad.edu.iq\/?p=9250","title":{"rendered":"A thesis in the College of Science for Women discussing Results on Number Theory Via Group Theory with Application in Cryptography"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8221;stretch_row&#8221; rtl_reverse=&#8221;yes&#8221; css=&#8221;.vc_custom_1726859899671{margin-top: -150px !important;padding-top: 150px !important;padding-bottom: 60px !important;background-color: #f5f5f5 !important;}&#8221;][vc_column width=&#8221;1\/2&#8243;]<div class=\"cz_gap clr \" style=\"height: 50px\"><\/div><div id=\"cz_26433\" class=\"cz_26433 cz_title clr cz_mobile_text_center cz_title_pos_inline tac\"><div class=\"cz_title_content\"><div class=\"cz_wpe_content\"><p style=\"color: #102d5c; font-family: Montserrat; text-align: center;\"><span style=\"font-size: 38px;\"><span style=\"color: #102d5c;\"><span style=\"color: #f5c538;\">Master&#8217;s <\/span><\/span><span style=\"color: #102d5c;\">Discussion<\/span><\/span><\/p>\n<p style=\"text-align: left;\">The College of Science for Women at the University of Baghdad discussed a master&#8217;s thesis<\/p>\n<p style=\"text-align: left;\">(Results on Number Theory Via Group Theory with Application in Cryptography(<\/p>\n<p style=\"text-align: left;\">by a student (Fatehiya Abdul Kareem Abed).<\/p>\n<\/div><\/div><\/div><div class=\"relative\"><div id=\"cz_97039\" class=\"cz_97039 cz_line tal\"><\/div><\/div><div class=\"clr\"><\/div><div class=\"cz_gap clr \" style=\"height: 50px\"><\/div><div id=\"cz_81239\" data-arrows='{\"open\":\"fa fa-angle-down\",\"close\":\"fa fa-angle-up\"}' class=\"cz_81239 cz_acc clr\"><div><div id=\"cz_71448\"><span class=\"cz_acc_child\"><i class=\"cz-acc-i cz-acc-icon fa czico-052-three-2\"><\/i><div>Objectives of the Thesis<\/div><\/span><div class=\"cz_acc_child_content clr\">[vc_column_text css=&#8221;&#8221;]<strong>: <\/strong>Group theory is one of the important branches of mathematics that has various applications in several fields, including number theory, geometry and cryptography .In this study, first, some facts of number theory were proven based on concepts in group theory, using new strategies such as the inverse of Wilson&#8217;s theorem and some other issues for distinguishing between prime numbers. Second, a practical application of these two theories (groups and numbers) in cryptography was presented. Two modifications of the well-known asymmetric encryption algorithms, RSA and ElGamal, were proposed. These modified encryption systems were named Power RSA (P-RSA) and Power ElGamal (P-ElGamal). These systems used powers of integers instead of using prime numbers directly. These powers were also kept secret by both the sender and receiver. Group theory has been used to prove that these cryptosystems work properly.[\/vc_column_text]<\/div><\/div><div id=\"cz_44265\"><span class=\"cz_acc_child\"><i class=\"cz-acc-i cz-acc-icon fa czico-052-three-2\"><\/i><div>Content of the Thesis<\/div><\/span><div class=\"cz_acc_child_content clr\">[vc_column_text css=&#8221;&#8221;]simulations were conducted to test the performance of the two proposed algorithms and compare each proposed algorithm with the standard algorithm using Python code.[\/vc_column_text]<\/div><\/div><div id=\"cz_14338\"><span class=\"cz_acc_child\"><i class=\"cz-acc-i cz-acc-icon fa czico-052-three-2\"><\/i><div>recommendations<\/div><\/span><div class=\"cz_acc_child_content clr\">[vc_column_text css=&#8221;&#8221;]The simulation results show that the execution time complexity of P-RSA encryption is approximately similar to that of RSA encryption, while the execution time for the encryption process of P-ElGamal is higher than that of both ElGamal and P-RSA. Furthermore, the decryption time complexity of P-RSA is higher than that of RSA and P-ElGamal, which in turn is higher than that of the ElGamal decryption process. The complexity of the ciphertext size of P-RSA and P-ElGamal encryption is larger than that of RSA and ElGamal, respectively. Furthermore, the complexity of the private key and ciphertext in P-RSA is higher than that of other comparable algorithms. This demonstrates that integrating group theory with number theory not only enhances theoretical understanding but also offers practical benefits in modern cryptography. The proposed improvements demonstrate the ability of sports structures to meet real-world security challenges.[\/vc_column_text]<\/div><\/div><div id=\"cz_20774\"><span class=\"cz_acc_child\"><i class=\"cz-acc-i cz-acc-icon far fa-image\"><\/i><div>Picture of members of heaven<\/div><\/span><div class=\"cz_acc_child_content clr\">[vc_column_text css=&#8221;&#8221;]<\/p>\n<div class=\"wp-block-image\">\n<p>&nbsp;<\/p>\n<div class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" class=\"wpa-warning wpa-image-missing-alt aligncenter size-large wp-image-9252\" src=\"https:\/\/en.csw.uobaghdad.edu.iq\/wp-content\/uploads\/sites\/97\/2025\/08\/photo_2_2025-08-20_10-25-39-600x338.jpg\" alt=\"\" width=\"600\" height=\"338\" data-warning=\"Missing alt text\" srcset=\"https:\/\/en.csw.uobaghdad.edu.iq\/wp-content\/uploads\/sites\/97\/2025\/08\/photo_2_2025-08-20_10-25-39-600x338.jpg 600w, https:\/\/en.csw.uobaghdad.edu.iq\/wp-content\/uploads\/sites\/97\/2025\/08\/photo_2_2025-08-20_10-25-39-300x169.jpg 300w, https:\/\/en.csw.uobaghdad.edu.iq\/wp-content\/uploads\/sites\/97\/2025\/08\/photo_2_2025-08-20_10-25-39-768x432.jpg 768w, https:\/\/en.csw.uobaghdad.edu.iq\/wp-content\/uploads\/sites\/97\/2025\/08\/photo_2_2025-08-20_10-25-39.jpg 1280w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/div>\n<\/div>\n<p>[\/vc_column_text]<\/div><\/div><\/div><\/div>[vc_raw_js]JTNDc2NyaXB0JTNFJTIwdmFyJTIwdHJhbnNfcGFnZSUzRCUyMjQ5Mzg4JTIwJTIyJTIwJTNDJTJGc2NyaXB0JTNF[\/vc_raw_js][\/vc_column][vc_column width=&#8221;1\/2&#8243;]<div class=\"cz_gap clr \" style=\"height: 50px\"><\/div>[vc_single_image image=&#8221;9251&#8243; img_size=&#8221;700&#215;700&#8243; alignment=&#8221;right&#8221; css=&#8221;&#8221;][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; rtl_reverse=&#8221;yes&#8221; css=&#8221;.vc_custom_1726859899671{margin-top: -150px !important;padding-top: 150px !important;padding-bottom: 60px !important;background-color: #f5f5f5 !important;}&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_raw_js]JTNDc2NyaXB0JTNFJTIwdmFyJTIwdHJhbnNfcGFnZSUzRCUyMjQ5Mzg4JTIwJTIyJTIwJTNDJTJGc2NyaXB0JTNF[\/vc_raw_js][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;9251&#8243; img_size=&#8221;700&#215;700&#8243; alignment=&#8221;right&#8221; css=&#8221;&#8221;][\/vc_column][\/vc_row] &#8230; <\/p>\n","protected":false},"author":29,"featured_media":9251,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_lmt_disableupdate":"no","_lmt_disable":"","footnotes":""},"categories":[15,12],"tags":[],"class_list":["post-9250","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-masters","category-postgraduate-discussions"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>A thesis in the College of Science for Women discussing Results on Number Theory Via Group Theory with Application in Cryptography - College of Science for Women<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/en.csw.uobaghdad.edu.iq\/?p=9250\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A thesis in the College of Science for Women discussing Results on Number Theory Via Group Theory with Application in Cryptography - College of Science for Women\" \/>\n<meta property=\"og:description\" content=\"[vc_row full_width=&#8221;stretch_row&#8221; rtl_reverse=&#8221;yes&#8221; css=&#8221;.vc_custom_1726859899671{margin-top: -150px !important;padding-top: 150px !important;padding-bottom: 60px !important;background-color: #f5f5f5 !important;}&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_raw_js]JTNDc2NyaXB0JTNFJTIwdmFyJTIwdHJhbnNfcGFnZSUzRCUyMjQ5Mzg4JTIwJTIyJTIwJTNDJTJGc2NyaXB0JTNF[\/vc_raw_js][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;9251&#8243; img_size=&#8221;700&#215;700&#8243; alignment=&#8221;right&#8221; css=&#8221;&#8221;][\/vc_column][\/vc_row] ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/en.csw.uobaghdad.edu.iq\/?p=9250\" \/>\n<meta property=\"og:site_name\" content=\"College of Science for Women\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-21T09:34:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-25T07:16:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/en.csw.uobaghdad.edu.iq\/wp-content\/uploads\/sites\/97\/2025\/08\/photo_1_2025-08-20_10-25-39.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"960\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"csw\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"csw\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/en.csw.uobaghdad.edu.iq\/?p=9250\",\"url\":\"https:\/\/en.csw.uobaghdad.edu.iq\/?p=9250\",\"name\":\"A thesis in the College of Science for Women discussing Results on Number Theory Via Group Theory with Application in Cryptography - College of Science for Women\",\"isPartOf\":{\"@id\":\"https:\/\/en.csw.uobaghdad.edu.iq\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/en.csw.uobaghdad.edu.iq\/?p=9250#primaryimage\"},\"image\":{\"@id\":\"https:\/\/en.csw.uobaghdad.edu.iq\/?p=9250#primaryimage\"},\"thumbnailUrl\":\"https:\/\/en.csw.uobaghdad.edu.iq\/wp-content\/uploads\/sites\/97\/2025\/08\/photo_1_2025-08-20_10-25-39.jpg\",\"datePublished\":\"2025-08-21T09:34:49+00:00\",\"dateModified\":\"2025-08-25T07:16:03+00:00\",\"author\":{\"@id\":\"https:\/\/en.csw.uobaghdad.edu.iq\/#\/schema\/person\/e2d8d23f32d2810ed05a93fd995a99de\"},\"breadcrumb\":{\"@id\":\"https:\/\/en.csw.uobaghdad.edu.iq\/?p=9250#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/en.csw.uobaghdad.edu.iq\/?p=9250\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/en.csw.uobaghdad.edu.iq\/?p=9250#primaryimage\",\"url\":\"https:\/\/en.csw.uobaghdad.edu.iq\/wp-content\/uploads\/sites\/97\/2025\/08\/photo_1_2025-08-20_10-25-39.jpg\",\"contentUrl\":\"https:\/\/en.csw.uobaghdad.edu.iq\/wp-content\/uploads\/sites\/97\/2025\/08\/photo_1_2025-08-20_10-25-39.jpg\",\"width\":960,\"height\":1280},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/en.csw.uobaghdad.edu.iq\/?p=9250#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/en.csw.uobaghdad.edu.iq\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A thesis in the College of Science for Women discussing Results on Number Theory Via Group Theory with Application in Cryptography\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/en.csw.uobaghdad.edu.iq\/#website\",\"url\":\"https:\/\/en.csw.uobaghdad.edu.iq\/\",\"name\":\"College of Science for Women\",\"description\":\"University of baghdad\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/en.csw.uobaghdad.edu.iq\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/en.csw.uobaghdad.edu.iq\/#\/schema\/person\/e2d8d23f32d2810ed05a93fd995a99de\",\"name\":\"csw\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/en.csw.uobaghdad.edu.iq\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/975096ae94d110f34c0a04073463cc8b4e1348753830dceb23577827e607beec?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/975096ae94d110f34c0a04073463cc8b4e1348753830dceb23577827e607beec?s=96&d=mm&r=g\",\"caption\":\"csw\"},\"url\":\"https:\/\/en.csw.uobaghdad.edu.iq\/?author=29\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A thesis in the College of Science for Women discussing Results on Number Theory Via Group Theory with Application in Cryptography - College of Science for Women","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/en.csw.uobaghdad.edu.iq\/?p=9250","og_locale":"en_US","og_type":"article","og_title":"A thesis in the College of Science for Women discussing Results on Number Theory Via Group Theory with Application in Cryptography - College of Science for Women","og_description":"[vc_row full_width=&#8221;stretch_row&#8221; rtl_reverse=&#8221;yes&#8221; css=&#8221;.vc_custom_1726859899671{margin-top: -150px !important;padding-top: 150px !important;padding-bottom: 60px !important;background-color: #f5f5f5 !important;}&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_raw_js]JTNDc2NyaXB0JTNFJTIwdmFyJTIwdHJhbnNfcGFnZSUzRCUyMjQ5Mzg4JTIwJTIyJTIwJTNDJTJGc2NyaXB0JTNF[\/vc_raw_js][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;9251&#8243; img_size=&#8221;700&#215;700&#8243; alignment=&#8221;right&#8221; css=&#8221;&#8221;][\/vc_column][\/vc_row] ...","og_url":"https:\/\/en.csw.uobaghdad.edu.iq\/?p=9250","og_site_name":"College of Science for Women","article_published_time":"2025-08-21T09:34:49+00:00","article_modified_time":"2025-08-25T07:16:03+00:00","og_image":[{"width":960,"height":1280,"url":"https:\/\/en.csw.uobaghdad.edu.iq\/wp-content\/uploads\/sites\/97\/2025\/08\/photo_1_2025-08-20_10-25-39.jpg","type":"image\/jpeg"}],"author":"csw","twitter_card":"summary_large_image","twitter_misc":{"Written by":"csw","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/en.csw.uobaghdad.edu.iq\/?p=9250","url":"https:\/\/en.csw.uobaghdad.edu.iq\/?p=9250","name":"A thesis in the College of Science for Women discussing Results on Number Theory Via Group Theory with Application in Cryptography - College of Science for Women","isPartOf":{"@id":"https:\/\/en.csw.uobaghdad.edu.iq\/#website"},"primaryImageOfPage":{"@id":"https:\/\/en.csw.uobaghdad.edu.iq\/?p=9250#primaryimage"},"image":{"@id":"https:\/\/en.csw.uobaghdad.edu.iq\/?p=9250#primaryimage"},"thumbnailUrl":"https:\/\/en.csw.uobaghdad.edu.iq\/wp-content\/uploads\/sites\/97\/2025\/08\/photo_1_2025-08-20_10-25-39.jpg","datePublished":"2025-08-21T09:34:49+00:00","dateModified":"2025-08-25T07:16:03+00:00","author":{"@id":"https:\/\/en.csw.uobaghdad.edu.iq\/#\/schema\/person\/e2d8d23f32d2810ed05a93fd995a99de"},"breadcrumb":{"@id":"https:\/\/en.csw.uobaghdad.edu.iq\/?p=9250#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/en.csw.uobaghdad.edu.iq\/?p=9250"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/en.csw.uobaghdad.edu.iq\/?p=9250#primaryimage","url":"https:\/\/en.csw.uobaghdad.edu.iq\/wp-content\/uploads\/sites\/97\/2025\/08\/photo_1_2025-08-20_10-25-39.jpg","contentUrl":"https:\/\/en.csw.uobaghdad.edu.iq\/wp-content\/uploads\/sites\/97\/2025\/08\/photo_1_2025-08-20_10-25-39.jpg","width":960,"height":1280},{"@type":"BreadcrumbList","@id":"https:\/\/en.csw.uobaghdad.edu.iq\/?p=9250#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/en.csw.uobaghdad.edu.iq\/"},{"@type":"ListItem","position":2,"name":"A thesis in the College of Science for Women discussing Results on Number Theory Via Group Theory with Application in Cryptography"}]},{"@type":"WebSite","@id":"https:\/\/en.csw.uobaghdad.edu.iq\/#website","url":"https:\/\/en.csw.uobaghdad.edu.iq\/","name":"College of Science for Women","description":"University of baghdad","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/en.csw.uobaghdad.edu.iq\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/en.csw.uobaghdad.edu.iq\/#\/schema\/person\/e2d8d23f32d2810ed05a93fd995a99de","name":"csw","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/en.csw.uobaghdad.edu.iq\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/975096ae94d110f34c0a04073463cc8b4e1348753830dceb23577827e607beec?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/975096ae94d110f34c0a04073463cc8b4e1348753830dceb23577827e607beec?s=96&d=mm&r=g","caption":"csw"},"url":"https:\/\/en.csw.uobaghdad.edu.iq\/?author=29"}]}},"modified_by":"csw","_links":{"self":[{"href":"https:\/\/en.csw.uobaghdad.edu.iq\/index.php?rest_route=\/wp\/v2\/posts\/9250","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/en.csw.uobaghdad.edu.iq\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/en.csw.uobaghdad.edu.iq\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/en.csw.uobaghdad.edu.iq\/index.php?rest_route=\/wp\/v2\/users\/29"}],"replies":[{"embeddable":true,"href":"https:\/\/en.csw.uobaghdad.edu.iq\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=9250"}],"version-history":[{"count":3,"href":"https:\/\/en.csw.uobaghdad.edu.iq\/index.php?rest_route=\/wp\/v2\/posts\/9250\/revisions"}],"predecessor-version":[{"id":9270,"href":"https:\/\/en.csw.uobaghdad.edu.iq\/index.php?rest_route=\/wp\/v2\/posts\/9250\/revisions\/9270"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/en.csw.uobaghdad.edu.iq\/index.php?rest_route=\/wp\/v2\/media\/9251"}],"wp:attachment":[{"href":"https:\/\/en.csw.uobaghdad.edu.iq\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=9250"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/en.csw.uobaghdad.edu.iq\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=9250"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/en.csw.uobaghdad.edu.iq\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=9250"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}