Staff Portal
Omar A. Dawood (Assistant Professor)

PhD in Information Security
Director of Continuing Education Center
Information Systems - Computer Sciences and IT


 Assist. Prof. Dr. Omar Abdulrahman Dawood was born in Habanyah, Anbar City, Iraq (1986). He got B.Sc. (2008), M.Sc. (2011) in Computer Science from the College of Computer and Information Technology, University of Anbar - Iraq. He was ranking the first during his B.Sc. and M.Sc. studies. He got the Ph.D. from the Computer Science Department, University of Technology-Baghdad - Iraq (2015). He is a teaching staff member and Director of Avicenna Division – Center for Continuing Education – University of Anbar. His research interests are: Data and Network Security, Coding, Number Theory and Cryptography.

 Personal Information:

Full Name:                    Omar A. Dawood 

Title of Position:            Instructor                       

Date &Place of Birth:    30/07/1986, Ramadi - Iraq          

Nationality:                     Iraqi                    

Marital Status:                Married    

Religion:                           Muslim

Contact Address:    College of Computer, Computer Science Department,   Anbar University, Anbar-Iraq.

E. Mail address:

E. Mail address:

Mob Phone: 009647905884333

Mob Phone: 009647723775802


Educational Background

Date &Degree

Awarding Authorization


B.Sc.                27-01-2009

College of Computer, Anbar University

Computer Science



College of Computer, Anbar University

Computer Science

Information Security (cryptography)



University of Technology, Department of Computer Science, Baghdad, Iraq 

Computer Science

Information Security (cryptography)



Title of M.Sc. Thesis:

(Proposed Family of Advanced Encryption Standard AES Variants).


Title of Ph.D. Dissertation:

(Development of Symmetric Cryptographic Models and Asymmetric Models Based on Magic Cube).








[1] Omar A. Dawood, Abdul Monem S. Rahma, Abdul Mohssen J. Abdul Hossen, “Symmetric Ciphers and Asymmetric Ciphers Based on Magic Cube with 6-D”, ISBN: 978-3-659-82728-0, Lap lambert academic publishing, Copy Right © 2016 OmniScriptum GmbH & Co. KG.




[1] A. M. Sagheer, S. S. Al-Rawi, and O. A. Dawood, “Proposing of Developed Advanced in Encryption Standard AES”, IEEE Computer Society DOI 10.1109/DESE, Page No. 197, 2011, The Fourth International Conference in Developments in E System Engineering DESE, Dubai, 2011.


[2] Omar A. Dawood, Othman I. Hammadi, “An Analytical Study for Some Drawbacks and Weakness Points of the AES Cipher (Rijndael Algorithm)”,  The 1st International Conference on Information Technology (ICoIT'17) Lebanese French University - Erbil, Kurdistan Region – Iraq 10th of April, 2017.





Published Researches:


[1] Omar A. Dawood, Abdul Monem S. Rahma, Abdul Mohssen J. Abdul Hossen, “The Euphrates Cipher”, IJCSI International Journal of Computer Science Issues, Volume 12, Issue 2, March 2015, ISSN (Print): 1694-0814 | ISSN (Online): 1694-0784.


[2] Omar A. Dawood, Abdul Monem S. Rahma, Abdul Mohssen J. Abdul Hossen, “The New Block Cipher Design (Tigris Cipher)”, International Journal of Computer Network and Information Security (IJCNIS), Vol.7, No.12, pp. 10-18, 2015.DOI: 10.5815/ijcnis.2015.12.02.


[3] Omar A. Dawood, Abdul Monem S. Rahma, Abdul Mohssen J. Abdul Hossen,"New Symmetric Cipher Fast Algorithm of Revertible Operations' Queen (FAROQ) Cipher", International Journal of Computer Network and Information Security (IJCNIS), Vol.9, No.4, pp. 29-36, 2017.DOI: 10.5815/ijcnis.2017.04.04.


[4] Omar A. Dawood, Abdul Monem S. Rahma, Abdul Mohssen J. Abdul Hossen, "New Variant of Public Key Based on Diffie-Hellman with Magic Cube of Six-Dimensions”, International Journal of Computer Science and Information Security (IJCSIS), ISSN 1947-5500, Vol. 13, No. 10, October 2015.


[5] Omar A. Dawood, Abdul Monem S. Rahma, Abdul Mohssen J. Abdul Hossen, “ Generalized Method for Constructing Magic Cube by Folded Magic Squares”,  International Journal of Intelligent Systems and Applications(IJISA), Vol. 8, No. 1, pp.1-8, Jan. 2016. DOI: 10.5815/ijisa.


[6] Abd-alrazzq, Hussein Khalid, Mohammad S. Ibrahim, and Omar Abdulrahman Dawood. "Secure internet voting system based on public key kerberos." IJCSI International Journal of Computer Science Issues 9, no. 2 (2012): 428-434.


[7] Abdul Monem S. Rahma, Abdul Mohssen J. Abdul Hossen and Omar A.Dawood, “Public Key Cipher with Signature Based on Diffie-Hellman and the Magic Square Problem”, Eng. &Tech. Journal, Vol.34,Part (B), No.1,2016.




No. Subjects Lectures Stage File Video
1 Multimedia computing 1st Introduction to JPEG Fourth
2 Multimedia computing 2nd JPEG Operations Fourth
3 Multimedia computing 3rd Zigzag Operations Fourth
4 Multimedia computing 4th JPEG-LS Fourth
5 Multimedia computing 5th 1-D Haar Fourth
6 Multimedia computing 6th Averaging and Differencing Fourth
7 Multimedia computing 7th MPEG Video Compression Fourth
8 Multimedia computing 8th H.261 Video Compression Fourth
9 Multimedia computing 9th MPEG Video Layers Fourth
10 Multimedia computing 10th Motion Stream Fourth
11 Multimedia computing 11th Motion Video Stream Fourth
12 Multimedia computing 12th Identification Code Fourth
13 Multimedia computing 13th UPS Code Fourth
14 Computer Security 1st Introduction Computer Security Fourth
15 Computer Security 2nd Computer Security Layers Fourth
16 Computer Security 4th Computer Security Malewares Fourth
17 Computer Security 5th Computer Security Encryption Fourth
18 Computer Security 6th Computer Backup Fourth
19 Computer Security 7th Computer Disaster Recovery Fourth
20 Computer Security 8th Computer Security Network Fourth
21 Computer Security 9th Computer Security Policy Fourth
22 Computer Security 10th Computer Security Legal Compliance Fourth
23 Computer Security References Fourth