Integrity verification for digital Holy Quran verses using cryptographic hash function and compression

被引:25
作者
Almazrooie, Mishal [1 ]
Samsudin, Azman [1 ]
Gutub, Adnan Abdul-Aziz [2 ]
Salleh, Muhammad Syukri [3 ]
Omar, Mohd Adib [1 ]
Hassan, Shahir Akram [3 ]
机构
[1] USM, Sch Comp Sci, George Town 11800, Malaysia
[2] Umm Al Qura Univ, Dept Comp Engn, Mecca, Saudi Arabia
[3] USM, Ctr Islamic Dev Management Studies, George Town 11800, Malaysia
关键词
Holy Quran; Data integrity; Cryptography; Hash function; Authentication;
D O I
10.1016/j.jksuci.2018.02.006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data Integrity is one of the primary concepts in information security. The main task of the cryptographic hash function is to assure the integrity of the transmitted data. In this work, integrity verification methods for digital verses of the Holy Quran are proposed. The first method uses cryptographic hash functions and generate the hash table of the Holy Quran. SHA256 and RIPEMD160 hash functions are chosen in this work. The second method is a single compression technique which manipulates data during the run time. The compression method makes use of the two bytes in Unicode UTF-8 for the Arabic characters set. The results show that for a digital copy of the Holy Quran encoded in Unicode UTF-8, the sizes of the hash tables generated by SHA256 and RIPEMD160 are 84.73% and 90.46% (6.55-fold and 10.48-fold) smaller respectively. The compressed version of the Holy Quran has a size of 47.24% (1.9-fold) smaller than the original copy. In addition, a second preimage attack on a hash table for the digital Holy Quran produced by using CRC32 hash function is conducted to study the impact of such attacks on the two hash tables proposed in this work. (C) 2018 The Authors. Production and hosting by Elsevier B.V. on behalf of King Saud University.
引用
收藏
页码:24 / 34
页数:11
相关论文
共 29 条
  • [1] AlAhmad MA, 2014, INT CONF ADV COMPUT, P250, DOI [10.1109/CICSYN.2013.81, 10.1109/ACSAT.2013.56]
  • [2] Alshareef A., 2012, 2012 International Conference on Innovations in Information Technology (IIT), P339, DOI 10.1109/INNOVATIONS.2012.6207762
  • [3] Alsmadi I., 2017, APPL COMPUT INFORM, V13, P38, DOI [10.1016/j.aci.2015.08.001, DOI 10.1016/J.ACI.2015.08.001]
  • [4] [Anonymous], [No title captured]
  • [5] [Anonymous], [No title captured]
  • [6] [Anonymous], [No title captured]
  • [7] [Anonymous], 2013, International Journal on Islamic Applications in Computer Science And Technology
  • [8] [Anonymous], [No title captured]
  • [9] [Anonymous], [No title captured]
  • [10] [Anonymous], [No title captured]