A Comparative Study Between RIPEMD160 and SHA256 Hash Functions On Digital Holy Quran Integrity Verification

Authors

  • N.M. Al-Aidroos Computer Science Department, College of Computers and Information Technology, Hadhramout University, Hadhramaut, Yemen
  • H.S. Baqtian Department of Information Technology, College of Computers and Information Technology, Ahgaff University, Hadhramaut, Yemen

Keywords:

Integrity, Holy Quran, SHA256, RIPEMD160, Hash Function

Abstract

In Data Security and Cryptography areas, hash functions play a fundamental and important role in the field of Integrity, This paper presents a performance evaluation of two cryptographic hash functions SHA256 and RIPEMD160 which used to verify the integrity of digital holy Quran and determine which one is better. SHA256 and RIPEMD160 hash functions have been selected in this comparison because their characteristics speed and space characteristics, both hash functions have their own advantages and disadvantages what distinguishes them from others, which will be discuss in detail in Background section. This study focuses on security and performance analysis. Security analysis where many experiments be applied to find out the strength and effectiveness of each two hash functions and hash collisions be analysed. The performance analysis will be applied by measuring the speed of the proposed methods in this study. The results show that the RIPEMD160 hash function is faster than SHA256 hash function for the integrity verification on a digital copy of the Holy Quran.

 

References

A. K. Saqib Hakak , Omar Tayan , Mohd Yamani Idna Idris , Gulshan Amin Gilkar, "Approaches for preserving content integrity of sensitive online Arabic content: A survey and research challenges," Elsevier journal, 2017.

M. Z. Izzat Alsmadi "Online integrity and authentication checking for Quran electronic versions," Elsevier, 2015.

A. S. Mishal Almazrooie , Adnan Abdul-Aziz Gutub , Muhammad Syukri Salleh ,Mohd Adib Omar , Shahir Akram Hassan, "Integrity verification for digital Holy Quran verses using cryptographic hash function and compression," ScienceDirect - Journal of King Saud University – Computer and Information Sciences, vol. 32, 2018.

A. K. SAQIB HAKAK, OMAR TAYAN, MOHD. YAMANI IDNA IDRIS,ABDULLAH GANI, AND SABER ZERDOUMI, "Preserving Content Integrity of Digital Holy Quran: Survey and Open Challenges," IEEE Access, 2017.

O. T. Yasser M. Alginahi, Muhammed N. Kabir1, "Verification of Qur’anic Quotations Embedded in Online Arabic and Islamic Websites," International Journal on Islamic, 2013.

G. P. Reddy, A. Narayana, P. K. Keerthan, B. Vineetha, and P. Honnavalli, "Multiple Hashing Using SHA-256 and MD5," in Advances in Computing and Network Communications, ed: Springer, pp. 643-655, 2021.

D. M. A. Cortez, A. M. Sison, and R. P. Medina, "Cryptographic randomness test of the modified hashing function of SHA256 to address length extension attack," in Proceedings of the 2020 8th International Conference on Communications and Broadband Networking, pp. 24-28, 2020.

V. K. Sarker, T. N. Gia, H. Tenhunen, and T. Westerlund, "Lightweight security algorithms for resource-constrained IoT-based sensor nodes," in ICC 2020-2020 IEEE International Conference on Communications (ICC), pp. 1-7, 2020.

J. T. T. D Rachmawati, A B C Ginting "A comparative study of Message Digest 5(MD5) and SHA256 algorithm," presented at the 2nd International Conference on Computing and Applied Informatics, Indonesia, 2017.

S. Halevi and H. Krawczyk, "Randomized Hashing and Digital Signatures," 2007.

H. J. K. Monika Parmar, "Comparative Analysis of Secured Hash Algorithms for Blockchain Technology and Internet of Things," International Journal of Advanced Computer Science and Applications, vol. 12, 2021.

N. P. Florian Mendel, Christian Rechberger, Vincent Rijmen, "On the Collision Resistance of RIPEMD-160," Springer, 2006.

S. M. D. Ali Maetouq, Noor Azurati Ahmad, Nurazean Maarop, Nilam Nur Amir Sjarif, Hafiza Abas, "Comparison of Hash Function Algorithms Against Attacks: A Review," (IJACSA) International Journal of Advanced Computer Science and Applications, vol. 9, 2018.

S. S. K.Sriprasadh, "Multiple Securities for Cloud Computing Using RIPEMD-160," SSRN journal, 2017.

S. A. I. Yaakub Bin Idris, Nurulhuda Firdaus Mohd Azmi, Azri Azmi, Azizul Azizan, "Enhancement Data Integrity Checking Using Combination MD5 and SHA1 Algorithm in Hadoop Architecture," Journal of Computer Science & Computational Mathematics, vol. 7, September 2017.

M. N. K. Omar Tayan, YasserM. Alginahi, "A Hybrid Digital-Signature and Zero-Watermarking Approach for Authentication and Protection of Sensitive Electronic Documents," Hindawi -The Scientific World Journal, 2014.

O. T. Lamri Laouamer "An Enhanced SVD Technique for Authentication and Protection of Text-Images using a Case Study on Digital Quran Content with Sensitivity Constraints," Life Science Journal, 2013.

Y. Z. Yuan Ping , Ke Lu , Baocang Wang, "Public Data Integrity Verification Scheme for Secure Cloud Storage," MDPI journal, 2020.

F. N. A.-W. Anwer Mustafa Hilal, Abdelzahir Abdelmaboud, Manar Ahmed Hamza,Mohammad Mahzari ,Abdulkhaleq Q.A. Hassan, "A Hybrid Intelligent Text Watermarking and Natural Language Processing Approach for Transferring and Receiving an Authentic English Text Via Internet," Computational Intelligence, Machine Learning and Data Analytics The Computer Journal, vol. 00, 7 May 2021.

S. Long, "A Comparative Analysis of the Application of Hashing Encryption Algorithms for MD5, SHA-1, and SHA-512," ICEMCE, 2019.

P. Pittalia, "A Comparative Study of Hash Algorithms in Cryptography," International Journal of Computer Science and Mobile Computing IJCSMC, vol. 8, pp. 147 – 152, 2019.

T. M. Aishah Alfrhan a, Abdulatif Alabdulatif "Comparative study on hash functions for lightweight blockchain in Internet of Things (IoT)," Blockchain: Research and Applications available at ScienceDirect, vol. 2, pp. 2096-7209, 2021.

N. G. Jibi Mariam Biju, Anju J Prakash "CYBER ATTACKS AND ITS DIFFERENT TYPES," international Research Journal of Engineering and Technology (IRJET), 2019.

G. W. Hongbo Yu, Guoyan Zhang, and Xiaoyun Wang, "The Second-Preimage Attack on MD4," presented at the National Natural Science Foundation of China, China, 2005.

H. D. Bart Preneel, Antoon Bosselaers, "The Cryptographic Hash Function RIPEMD-160," CryptoBytes 1997.

Downloads

Published

2022-10-31

How to Cite

[1]
N. Al-Aidroos and H. Baqtian, “A Comparative Study Between RIPEMD160 and SHA256 Hash Functions On Digital Holy Quran Integrity Verification”, Int. J. Sci. Res. Net. Sec. Comm., vol. 10, no. 4, pp. 1–7, Oct. 2022.

Issue

Section

Research Article

Similar Articles

<< < 1 2 3 > >> 

You may also start an advanced similarity search for this article.