Repository logo
  • English
  • Deutsch
  • Español
  • Français
Log In
New user? Click here to register.
  1. Home
  2. Browse by Author

Browsing by Author "Mohammad Abdulateff Ahmad"

Filter results by typing the first few letters
Now showing 1 - 1 of 1
  • Results Per Page
  • Sort Options
  • Loading...
    Thumbnail Image
    Some of the metrics are blocked by your 
    consent settings
    Publication
    Protection Of The Digital Holy Quran Using IT Techniques
    (Kuala Lumpur : Kulliyyah of Information and Communication Technology, International Islamic University Malaysia, 2014, 2014)
    Mohammad Abdulateff Ahmad
    ;
    We have, without doubt, sent down the Message (Quran); and We will assuredly guard it (from corruption). (al-Hijr 15: 9) The Holy Quran is very important not only to Muslims, but to the whole world, because it is the constitution of the life all the time. Today, in the era of electronic revolution and information, the subsequent radical changes on the nature of the information, Muslims use computer devices “for ex, laptops, desktops, Galaxy tab and many others” to view and read the digital Holy Quran. Knowing this, then, designing a protection mechanism to protect the digital Holy Quran from any type of modification, tampering and changes is one of the most important and holy task. Thus, it is a demand task to design such a protection methods that verify the safety of all the contents of the digital Holy Quran, and keeping it protected against any changes and counterfeiting intentionally or unintentionally. This thesis defines a protection mechanism called Quran Guardian. The Quran Guardian consists of three new and developed protection methods. The first method is to design a new keyed cryptographic hash function called Gear to verify the data integrity and authenticity of the digital Holy Quran. Gear is a new concrete novel design based on C- Gear block cipher in Davies-Meyer mode. Where, C- Gear applies the wide trail strategy. Also, Gear has two main versions Gear - 256 and Gear -512, with an output length of 256 and 512 bits, respectively. It uses a patched version of Merkle-Damgård, i.e. the wide pipe construction as its mode of operation. Thus, the intermediate chaining value has at least twice larger length than the output hash. We claimed that it is hard to attack Gear with complexities significantly less than brute force. The second method is to develop an encryption method called CARCA. CARCA is Combination between AES and RSA Cryptography Algorithms. The combination between both techniques of cryptography brings the best of each together, the speed of AES encryption and the security of RSA encryption. Working to minimize the disadvantages of both to make the cryptography faster and efficient is our main target. And the third method is to develop a digital watermarking technique called FRAGIE which combines SLSB algorithm and DCT extracting feature. FRAGIE is invisible fragile watermark which embeds in a way so that any modification or attack would cause the watermark destruction. This destruction would work as tampering detection. Doing this, as being the reason to fulfill Allah’s promise as in the verse above

This site contains copyrighted unpublished research owned by International Islamic University Malaysia (IIUM) and(or) the owner of the research. No part of any material contained in or derived from any unpublished research may be used without written permission of the copyright holders or due acknowledgement.

Contact:
  • Dar al-Hikmah Library
    International Islamic University Malaysia (IIUM)
    P.O Box 10, 50728
    Kuala Lumpur
  • +603-64214829/4813
  • studentrepo@iium.edu.my
Follow Us:
Copyright © 2024: Dar al-Hikmah Library, IIUM
by CDSOL