Full Paper View Go Back

A Comparative Study Between RIPEMD160 and SHA256 Hash Functions On Digital Holy Quran Integrity Verification

N.M. Al-Aidroos1 , H.S. Baqtian2

Section:Research Paper, Product Type: Journal
Vol.10 , Issue.4 , pp.1-7, Oct-2022

Online published on Oct 31, 2022


Copyright © N.M. Al-Aidroos, H.S. Baqtian . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: N.M. Al-Aidroos, H.S. Baqtian, “A Comparative Study Between RIPEMD160 and SHA256 Hash Functions On Digital Holy Quran Integrity Verification,” International Journal of Scientific Research in Network Security and Communication, Vol.10, Issue.4, pp.1-7, 2022.

MLA Style Citation: N.M. Al-Aidroos, H.S. Baqtian "A Comparative Study Between RIPEMD160 and SHA256 Hash Functions On Digital Holy Quran Integrity Verification." International Journal of Scientific Research in Network Security and Communication 10.4 (2022): 1-7.

APA Style Citation: N.M. Al-Aidroos, H.S. Baqtian, (2022). A Comparative Study Between RIPEMD160 and SHA256 Hash Functions On Digital Holy Quran Integrity Verification. International Journal of Scientific Research in Network Security and Communication, 10(4), 1-7.

BibTex Style Citation:
@article{Al-Aidroos_2022,
author = {N.M. Al-Aidroos, H.S. Baqtian},
title = {A Comparative Study Between RIPEMD160 and SHA256 Hash Functions On Digital Holy Quran Integrity Verification},
journal = {International Journal of Scientific Research in Network Security and Communication},
issue_date = {10 2022},
volume = {10},
Issue = {4},
month = {10},
year = {2022},
issn = {2347-2693},
pages = {1-7},
url = {https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=422},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=422
TI - A Comparative Study Between RIPEMD160 and SHA256 Hash Functions On Digital Holy Quran Integrity Verification
T2 - International Journal of Scientific Research in Network Security and Communication
AU - N.M. Al-Aidroos, H.S. Baqtian
PY - 2022
DA - 2022/10/31
PB - IJCSE, Indore, INDIA
SP - 1-7
IS - 4
VL - 10
SN - 2347-2693
ER -

255 Views    258 Downloads    160 Downloads
  
  

Abstract :
In Data Security and Cryptography areas, hash functions play a fundamental and important role in the field of Integrity, This paper presents a performance evaluation of two cryptographic hash functions SHA256 and RIPEMD160 which used to verify the integrity of digital holy Quran and determine which one is better. SHA256 and RIPEMD160 hash functions have been selected in this comparison because their characteristics speed and space characteristics, both hash functions have their own advantages and disadvantages what distinguishes them from others, which will be discuss in detail in Background section. This study focuses on security and performance analysis. Security analysis where many experiments be applied to find out the strength and effectiveness of each two hash functions and hash collisions be analysed. The performance analysis will be applied by measuring the speed of the proposed methods in this study. The results show that the RIPEMD160 hash function is faster than SHA256 hash function for the integrity verification on a digital copy of the Holy Quran.

Key-Words / Index Term :
Integrity, Holy Quran, SHA256, RIPEMD160, Hash Function, Data Security, Verification

References :
[1] A. K. Saqib Hakak , Omar Tayan , Mohd Yamani Idna Idris , Gulshan Amin Gilkar, "Approaches for preserving content integrity of sensitive online Arabic content: A survey and research challenges," Elsevier journal, 2017.
[2] M. Z. Izzat Alsmadi "Online integrity and authentication checking for Quran electronic versions," Elsevier, 2015.
[3] A. S. Mishal Almazrooie , Adnan Abdul-Aziz Gutub , Muhammad Syukri Salleh ,Mohd Adib Omar , Shahir Akram Hassan, "Integrity verification for digital Holy Quran verses using cryptographic hash function and compression," ScienceDirect - Journal of King Saud University – Computer and Information Sciences, vol. 32, 2018.
[4] A. K. SAQIB HAKAK, OMAR TAYAN, MOHD. YAMANI IDNA IDRIS,ABDULLAH GANI, AND SABER ZERDOUMI, "Preserving Content Integrity of Digital Holy Quran: Survey and Open Challenges," IEEE Access, 2017.
[5] O. T. Yasser M. Alginahi, Muhammed N. Kabir1, "Verification of Qur’anic Quotations Embedded in Online Arabic and Islamic Websites," International Journal on Islamic, 2013.
[6] G. P. Reddy, A. Narayana, P. K. Keerthan, B. Vineetha, and P. Honnavalli, "Multiple Hashing Using SHA-256 and MD5," in Advances in Computing and Network Communications, ed: Springer, pp. 643-655, 2021.
[7] D. M. A. Cortez, A. M. Sison, and R. P. Medina, "Cryptographic randomness test of the modified hashing function of SHA256 to address length extension attack," in Proceedings of the 2020 8th International Conference on Communications and Broadband Networking, pp. 24-28, 2020.
[8] V. K. Sarker, T. N. Gia, H. Tenhunen, and T. Westerlund, "Lightweight security algorithms for resource-constrained IoT-based sensor nodes," in ICC 2020-2020 IEEE International Conference on Communications (ICC), pp. 1-7, 2020.
[9] J. T. T. D Rachmawati, A B C Ginting "A comparative study of Message Digest 5(MD5) and SHA256 algorithm," presented at the 2nd International Conference on Computing and Applied Informatics, Indonesia, 2017.
[10] S. Halevi and H. Krawczyk, "Randomized Hashing and Digital Signatures," 2007.
[11] H. J. K. Monika Parmar, "Comparative Analysis of Secured Hash Algorithms for Blockchain Technology and Internet of Things," International Journal of Advanced Computer Science and Applications, vol. 12, 2021.
[12] N. P. Florian Mendel, Christian Rechberger, Vincent Rijmen, "On the Collision Resistance of RIPEMD-160," Springer, 2006.
[13] S. M. D. Ali Maetouq, Noor Azurati Ahmad, Nurazean Maarop, Nilam Nur Amir Sjarif, Hafiza Abas, "Comparison of Hash Function Algorithms Against Attacks: A Review," (IJACSA) International Journal of Advanced Computer Science and Applications, vol. 9, 2018.
[14] S. S. K.Sriprasadh, "Multiple Securities for Cloud Computing Using RIPEMD-160," SSRN journal, 2017.
[15] S. A. I. Yaakub Bin Idris, Nurulhuda Firdaus Mohd Azmi, Azri Azmi, Azizul Azizan, "Enhancement Data Integrity Checking Using Combination MD5 and SHA1 Algorithm in Hadoop Architecture," Journal of Computer Science & Computational Mathematics, vol. 7, September 2017.
[16] M. N. K. Omar Tayan, YasserM. Alginahi, "A Hybrid Digital-Signature and Zero-Watermarking Approach for Authentication and Protection of Sensitive Electronic Documents," Hindawi -The Scientific World Journal, 2014.
[17] O. T. Lamri Laouamer "An Enhanced SVD Technique for Authentication and Protection of Text-Images using a Case Study on Digital Quran Content with Sensitivity Constraints," Life Science Journal, 2013.
[18] Y. Z. Yuan Ping , Ke Lu , Baocang Wang, "Public Data Integrity Verification Scheme for Secure Cloud Storage," MDPI journal, 2020.
[19] F. N. A.-W. Anwer Mustafa Hilal, Abdelzahir Abdelmaboud, Manar Ahmed Hamza,Mohammad Mahzari ,Abdulkhaleq Q.A. Hassan, "A Hybrid Intelligent Text Watermarking and Natural Language Processing Approach for Transferring and Receiving an Authentic English Text Via Internet," Computational Intelligence, Machine Learning and Data Analytics The Computer Journal, vol. 00, 7 May 2021.
[20] S. Long, "A Comparative Analysis of the Application of Hashing Encryption Algorithms for MD5, SHA-1, and SHA-512," ICEMCE, 2019.
[21] P. Pittalia, "A Comparative Study of Hash Algorithms in Cryptography," International Journal of Computer Science and Mobile Computing IJCSMC, vol. 8, pp. 147 – 152, 2019.
[22] T. M. Aishah Alfrhan a, Abdulatif Alabdulatif "Comparative study on hash functions for lightweight blockchain in Internet of Things (IoT)," Blockchain: Research and Applications available at ScienceDirect, vol. 2, pp. 2096-7209, 2021.
[23] N. G. Jibi Mariam Biju, Anju J Prakash "CYBER ATTACKS AND ITS DIFFERENT TYPES," international Research Journal of Engineering and Technology (IRJET), 2019.
[24] G. W. Hongbo Yu, Guoyan Zhang, and Xiaoyun Wang, "The Second-Preimage Attack on MD4," presented at the National Natural Science Foundation of China, China, 2005.
[25] H. D. Bart Preneel, Antoon Bosselaers, "The Cryptographic Hash Function RIPEMD-160," CryptoBytes 1997.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at ijsrnsc@gmail.com or view contact page for more details.

Impact Factor

Journals Contents

Information

Downloads

Digital Certificate

Go to Navigation