Applying Quran Security and Hamming CodesFor Preventing of Text Modification
The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests...
Saved in:
| Main Author: | |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
University of Baghdad, College of Science for Women
2011-06-01
|
| Series: | مجلة بغداد للعلوم |
| Subjects: | |
| Online Access: | http://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/2815 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1849398028952141824 |
|---|---|
| author | Baghdad Science Journal |
| author_facet | Baghdad Science Journal |
| author_sort | Baghdad Science Journal |
| collection | DOAJ |
| description | The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification.
This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders.
This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the changes in the reordering letters or words of the paragraph and text without changing the letters themselves. So, the next step uses one of the error detection methods which is named Hamming Codes to find out the locations of the change in the received text. After that; at the third step, RSA as a primary encryption method has been used to encrypt the keys extracted to the first step and second step in order to prevent the intruders to break down the security of the method. |
| format | Article |
| id | doaj-art-e569e2aa40e74a95b1e96abb3dd7dbcc |
| institution | Kabale University |
| issn | 2078-8665 2411-7986 |
| language | English |
| publishDate | 2011-06-01 |
| publisher | University of Baghdad, College of Science for Women |
| record_format | Article |
| series | مجلة بغداد للعلوم |
| spelling | doaj-art-e569e2aa40e74a95b1e96abb3dd7dbcc2025-08-20T03:38:44ZengUniversity of Baghdad, College of Science for Womenمجلة بغداد للعلوم2078-86652411-79862011-06-018210.21123/bsj.8.2.408-418Applying Quran Security and Hamming CodesFor Preventing of Text ModificationBaghdad Science JournalThe widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the changes in the reordering letters or words of the paragraph and text without changing the letters themselves. So, the next step uses one of the error detection methods which is named Hamming Codes to find out the locations of the change in the received text. After that; at the third step, RSA as a primary encryption method has been used to encrypt the keys extracted to the first step and second step in order to prevent the intruders to break down the security of the method.http://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/2815Security systems, Hamming Codes, Error detection and correction, Encryption algorithms, public key encryption, RSA Encryption Algorithm |
| spellingShingle | Baghdad Science Journal Applying Quran Security and Hamming CodesFor Preventing of Text Modification مجلة بغداد للعلوم Security systems, Hamming Codes, Error detection and correction, Encryption algorithms, public key encryption, RSA Encryption Algorithm |
| title | Applying Quran Security and Hamming CodesFor Preventing of Text Modification |
| title_full | Applying Quran Security and Hamming CodesFor Preventing of Text Modification |
| title_fullStr | Applying Quran Security and Hamming CodesFor Preventing of Text Modification |
| title_full_unstemmed | Applying Quran Security and Hamming CodesFor Preventing of Text Modification |
| title_short | Applying Quran Security and Hamming CodesFor Preventing of Text Modification |
| title_sort | applying quran security and hamming codesfor preventing of text modification |
| topic | Security systems, Hamming Codes, Error detection and correction, Encryption algorithms, public key encryption, RSA Encryption Algorithm |
| url | http://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/2815 |
| work_keys_str_mv | AT baghdadsciencejournal applyingquransecurityandhammingcodesforpreventingoftextmodification |