Applying Quran Security and Hamming CodesFor Preventing of Text Modification

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests...

Full description

Bibliographic Details
Main Author: Baghdad Science Journal
Format: Article
Language:Arabic
Published: College of Science for Women, University of Baghdad 2011-06-01
Series:Baghdad Science Journal
Subjects:
Online Access:http://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/2815
_version_ 1811284575112921088
author Baghdad Science Journal
author_facet Baghdad Science Journal
author_sort Baghdad Science Journal
collection DOAJ
description The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the changes in the reordering letters or words of the paragraph and text without changing the letters themselves. So, the next step uses one of the error detection methods which is named Hamming Codes to find out the locations of the change in the received text. After that; at the third step, RSA as a primary encryption method has been used to encrypt the keys extracted to the first step and second step in order to prevent the intruders to break down the security of the method.
first_indexed 2024-04-13T02:31:39Z
format Article
id doaj.art-e569e2aa40e74a95b1e96abb3dd7dbcc
institution Directory Open Access Journal
issn 2078-8665
2411-7986
language Arabic
last_indexed 2024-04-13T02:31:39Z
publishDate 2011-06-01
publisher College of Science for Women, University of Baghdad
record_format Article
series Baghdad Science Journal
spelling doaj.art-e569e2aa40e74a95b1e96abb3dd7dbcc2022-12-22T03:06:34ZaraCollege of Science for Women, University of BaghdadBaghdad Science Journal2078-86652411-79862011-06-018210.21123/bsj.8.2.408-418Applying Quran Security and Hamming CodesFor Preventing of Text ModificationBaghdad Science JournalThe widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the changes in the reordering letters or words of the paragraph and text without changing the letters themselves. So, the next step uses one of the error detection methods which is named Hamming Codes to find out the locations of the change in the received text. After that; at the third step, RSA as a primary encryption method has been used to encrypt the keys extracted to the first step and second step in order to prevent the intruders to break down the security of the method.http://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/2815Security systems, Hamming Codes, Error detection and correction, Encryption algorithms, public key encryption, RSA Encryption Algorithm
spellingShingle Baghdad Science Journal
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
Baghdad Science Journal
Security systems, Hamming Codes, Error detection and correction, Encryption algorithms, public key encryption, RSA Encryption Algorithm
title Applying Quran Security and Hamming CodesFor Preventing of Text Modification
title_full Applying Quran Security and Hamming CodesFor Preventing of Text Modification
title_fullStr Applying Quran Security and Hamming CodesFor Preventing of Text Modification
title_full_unstemmed Applying Quran Security and Hamming CodesFor Preventing of Text Modification
title_short Applying Quran Security and Hamming CodesFor Preventing of Text Modification
title_sort applying quran security and hamming codesfor preventing of text modification
topic Security systems, Hamming Codes, Error detection and correction, Encryption algorithms, public key encryption, RSA Encryption Algorithm
url http://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/2815
work_keys_str_mv AT baghdadsciencejournal applyingquransecurityandhammingcodesforpreventingoftextmodification