Protection of the digital holy Quran using SAB hash function

Cryptography consists of a set of algorithms and techniques to convert the data into another form so that the contents are unreadable and unexplainable to anyone who does not have the authority to read or write on these data. One of the tools used by cryptography is the hash function. The hash funct...

Full description

Saved in:
Bibliographic Details
Main Authors: Alshaikhli, Imad Fakhri Taha, Alahmad, Mohammad
Format: Proceeding Paper
Language:en
en
en
Published: 2013
Subjects:
Online Access:http://irep.iium.edu.my/30607/2/Table_of_Content.pdf
http://irep.iium.edu.my/30607/3/53.pdf
http://irep.iium.edu.my/30607/4/certificate_%28Dr__Imad_Fakhri%292013.pdf
http://irep.iium.edu.my/30607/
http://dsr-conferences.co.uk/iman/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1834427570973573120
author Alshaikhli, Imad Fakhri Taha
Alahmad, Mohammad
author_facet Alshaikhli, Imad Fakhri Taha
Alahmad, Mohammad
author_sort Alshaikhli, Imad Fakhri Taha
building IIUM Library
collection Institutional Repository
content_provider International Islamic University Malaysia
content_source IIUM Repository (IREP)
continent Asia
country Malaysia
description Cryptography consists of a set of algorithms and techniques to convert the data into another form so that the contents are unreadable and unexplainable to anyone who does not have the authority to read or write on these data. One of the tools used by cryptography is the hash function. The hash function is used to hash the file so that if anyone tries to modify the text in the file, the number of file obtained from hashing will change. In this paper, we designed a concrete hash function called SAB. SAB hash function uses a permutation Q used in Grøstl hash function as a permutation function. Also, it uses the fast wide pipe (FWP) construction designed by Nandi and Paul presented in Indocrypt2010 conference. SAB hash function is designed to protect the data integrity of the digital Holy Quran from alterations or manipulations. SAB hash function outputs 512-bits as the final digests.
format Proceeding Paper
id my.iium.irep-30607
institution Universiti Islam Antarabangsa Malaysia
language en
en
en
publishDate 2013
record_format dspace
spelling my.iium.irep-306072013-08-28T03:23:05Z http://irep.iium.edu.my/30607/ Protection of the digital holy Quran using SAB hash function Alshaikhli, Imad Fakhri Taha Alahmad, Mohammad QA75 Electronic computers. Computer science Cryptography consists of a set of algorithms and techniques to convert the data into another form so that the contents are unreadable and unexplainable to anyone who does not have the authority to read or write on these data. One of the tools used by cryptography is the hash function. The hash function is used to hash the file so that if anyone tries to modify the text in the file, the number of file obtained from hashing will change. In this paper, we designed a concrete hash function called SAB. SAB hash function uses a permutation Q used in Grøstl hash function as a permutation function. Also, it uses the fast wide pipe (FWP) construction designed by Nandi and Paul presented in Indocrypt2010 conference. SAB hash function is designed to protect the data integrity of the digital Holy Quran from alterations or manipulations. SAB hash function outputs 512-bits as the final digests. 2013-07-01 Proceeding Paper PeerReviewed application/pdf en http://irep.iium.edu.my/30607/2/Table_of_Content.pdf application/pdf en http://irep.iium.edu.my/30607/3/53.pdf application/pdf en http://irep.iium.edu.my/30607/4/certificate_%28Dr__Imad_Fakhri%292013.pdf Alshaikhli, Imad Fakhri Taha and Alahmad, Mohammad (2013) Protection of the digital holy Quran using SAB hash function. In: International Conference on Islamic Applications in Computer Science and Technologies, 1-2 July 2013, Palace of the Golden Horses, Mines Resort City, Kuala Lumpur. http://dsr-conferences.co.uk/iman/
spellingShingle QA75 Electronic computers. Computer science
Alshaikhli, Imad Fakhri Taha
Alahmad, Mohammad
Protection of the digital holy Quran using SAB hash function
title Protection of the digital holy Quran using SAB hash function
title_full Protection of the digital holy Quran using SAB hash function
title_fullStr Protection of the digital holy Quran using SAB hash function
title_full_unstemmed Protection of the digital holy Quran using SAB hash function
title_short Protection of the digital holy Quran using SAB hash function
title_sort protection of the digital holy quran using sab hash function
topic QA75 Electronic computers. Computer science
url http://irep.iium.edu.my/30607/2/Table_of_Content.pdf
http://irep.iium.edu.my/30607/3/53.pdf
http://irep.iium.edu.my/30607/4/certificate_%28Dr__Imad_Fakhri%292013.pdf
http://irep.iium.edu.my/30607/
http://dsr-conferences.co.uk/iman/
url_provider http://irep.iium.edu.my/