Protection of the digital holy Quran using SAB hash function
Cryptography consists of a set of algorithms and techniques to convert the data into another form so that the contents are unreadable and unexplainable to anyone who does not have the authority to read or write on these data. One of the tools used by cryptography is the hash function. The hash funct...
Main Authors: | , |
---|---|
Format: | Conference or Workshop Item |
Language: | English English English |
Published: |
2013
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/30607/ http://irep.iium.edu.my/30607/ http://irep.iium.edu.my/30607/2/Table_of_Content.pdf http://irep.iium.edu.my/30607/3/53.pdf http://irep.iium.edu.my/30607/4/certificate_%28Dr__Imad_Fakhri%292013.pdf |
Summary: | Cryptography consists of a set of algorithms and techniques to convert the data into another form so that the contents are unreadable and unexplainable to anyone who does not have the authority to read or write on these data. One of the tools used by cryptography is the hash function. The hash function is used to hash the file so that if anyone tries to modify the text in the file, the number of file obtained from hashing will change. In this paper, we designed a concrete hash function called SAB. SAB hash function uses a permutation Q used in Grøstl hash function as a permutation function. Also, it uses the fast wide pipe (FWP) construction designed by Nandi and Paul presented in Indocrypt2010 conference. SAB hash function is designed to protect the data integrity of the digital Holy Quran from alterations or manipulations. SAB hash function outputs 512-bits as the final digests. |
---|