Protection of the digital holy quran using IT techniques /

We have, without doubt, sent down the Message (Quran); and We will assuredly guard it (from corruption). (al-Hijr 15: 9) The Holy Quran is very important not only to Muslims, but to the whole world, because it is the constitution of the life all the time. Today, in the era of electronic revolution...

全面介紹

Saved in:
書目詳細資料
主要作者: Ahmad, Mohammad Abdulateef
格式: Thesis
語言:English
出版: Kuala Lumpur: Kulliyyah of Information and Communication Technology, International Islamic University Malaysia, 2014.
主題:
在線閱讀:http://studentrepo.iium.edu.my/handle/123456789/5515
標簽: 添加標簽
沒有標簽, 成為第一個標記此記錄!
實物特徵
總結:We have, without doubt, sent down the Message (Quran); and We will assuredly guard it (from corruption). (al-Hijr 15: 9) The Holy Quran is very important not only to Muslims, but to the whole world, because it is the constitution of the life all the time. Today, in the era of electronic revolution and information, the subsequent radical changes on the nature of the information, Muslims use computer devices “for ex, laptops, desktops, Galaxy tab and many others” to view and read the digital Holy Quran. Knowing this, then, designing a protection mechanism to protect the digital Holy Quran from any type of modification, tampering and changes is one of the most important and holy task. Thus, it is a demand task to design such a protection methods that verify the safety of all the contents of the digital Holy Quran, and keeping it protected against any changes and counterfeiting intentionally or unintentionally. This thesis defines a protection mechanism called Quran Guardian. The Quran Guardian consists of three new and developed protection methods. The first method is to design a new keyed cryptographic hash function called Gear to verify the data integrity and authenticity of the digital Holy Quran. Gear is a new concrete novel design based on C- Gear block cipher in Davies-Meyer mode. Where, C- Gear applies the wide trail strategy. Also, Gear has two main versions Gear - 256 and Gear -512, with an output length of 256 and 512 bits, respectively. It uses a patched version of Merkle-Damgård, i.e. the wide pipe construction as its mode of operation. Thus, the intermediate chaining value has at least twice larger length than the output hash. We claimed that it is hard to attack Gear with complexities significantly less than brute force. The second method is to develop an encryption method called CARCA. CARCA is Combination between AES and RSA Cryptography Algorithms. The combination between both techniques of cryptography brings the best of each together, the speed of AES encryption and the security of RSA encryption. Working to minimize the disadvantages of both to make the cryptography faster and efficient is our main target. And the third method is to develop a digital watermarking technique called FRAGIE which combines SLSB algorithm and DCT extracting feature. FRAGIE is invisible fragile watermark which embeds in a way so that any modification or attack would cause the watermark destruction. This destruction would work as tampering detection. Doing this, as being the reason to fulfill Allah's promise as in the verse above.
實物描述:xvii, 157 leaves : ill. ; 30cm.
參考書目:Includes bibliographical references (leaves 151-157).