Skip to main content

Development of Ethno-mathematics of Al-Qur’an, Al-Hadith, and Jawi Scripts for Computer Security

  • Conference paper
Islamic perspectives relating to business, arts, culture and communication

Abstract

Personal data is constantly being compromised not just by the normal identity thefts but also abnormal attacks. A continuous search on new paradigm of nonparametric cryptographs led to the discovery of ethno-mathematics for substitution block-cipher boxes. The objects are based on extracted Al-Qur’an and Al-Hadith symbols by use of ethno-mathematical functions. The extracted objects were insufficient to build the 256-bit block ciphers. The development of expanding objects from Jawi scripts may fill the gap for a 256-bit block cipher. Initial tests for algebraic attacks indicate ethno-mathematical block-cipher resistance to be better than the random parametric Khazad and Anubis Block Ciphers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Thomas, F. B., & Budinger, M. D. (2006). Ethics of emerging technologies-scientific facts – Moral challenges. Hoboken: Wiley.

    Google Scholar 

  2. Savage-Smith, E. (Ed.). (2004). Magic and divination in early Islam. The formation of the classical Islamic world (Vol. 42). Aldershot: Ashgate Publishing.

    Google Scholar 

  3. Ibn Mayor, & Shem Tov (Late 14th Century A.D.). (2005). Ha Ma’or ha-Gadol. Ms. Oxford, Bodl, 228, fol. 103a. (In Dov Schwartz. Astronomy in Ancient Judaism. The encyclopedia of Judaism. 2nd Ed. Jacob Neusner, Alan J. Avery-Peck & William Scott Green (Vol. I, A–E). Boston: Brill Leiden.

    Google Scholar 

  4. Stinson, D. R. (2006). Cryptography theory and practice (3rd ed.). Boca Raton: Chapman & Hall/CRC.

    Google Scholar 

  5. Jacques Patarin. (2008). Generic attacks on feistel schemes. International Association for Cryptologic Research ePrint Archive.

    Google Scholar 

  6. Jacques Patarin, Valerie Nachef, & Come Berbain. (2007). Generic attacks on unbalanced feistel schemes with expanding functions. International Association for Cryptologic Research ePrint Archive.

    Google Scholar 

  7. National Institute of Standards and Technology. (2001, November 26). Federal information processing standards publication 197. Advanced Encryption Standards. http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf

  8. A. Faizul Shamsudin, Rusydi Hasan Makarim, Abi Dzar Jaafar, & Mardiana Muhammad Taufick. (2009, September 7). Substitution-box in unique class encryption Al – Muqatta’at, Al-Mu’awwidhazatain and Ayatul Qursi (Technical Report). Research Management Centre, IIUM.

    Google Scholar 

  9. D’Ambrosio, U. (1997). Ethnomathematics and its address in the history and pedagogy of mathematics. In A. B. Powell & M. Frankenstein (Eds.), Ethnomathematics. Challenging Eurocentrism in mathematics education (pp. 13–24). Albany: State University of New York Press.

    Google Scholar 

  10. Gerdes, P. (2001). Ethno-mathematics as a new research field, illustrated by studies of mathematical ideas in African history. In J. J. Saldana (Ed.), Science and cultural diversity. Filling a gap in the history of science (pp. 11–36). Mexico: Cuardernos de Quipu.

    Google Scholar 

  11. Abdallah Yusuf Ali. (1994). The Holy Quran-text and translation. Al-Ikhlas, Al-Falaq, Al-Nas (pp. 634–635). Kuala Lumpur: Islamic Book Trust.

    Google Scholar 

  12. Sahih Al-Bukhari: Kitab al-Tibb, Bab Ruqyah al-Nabiyy. Narration by ‘Aisha on the superiority of the Al-Muawwizah’.

    Google Scholar 

  13. Al-Baqarah (Vol. 255, p. 37).

    Google Scholar 

  14. Al-Isra’ (Vol. 82, p. 268).

    Google Scholar 

  15. National Institute of Standards and Technology, Federal Information Processing Standards Publication 197, Advanced Encryption Standards (http://csrc.nist.gov/publications/fips/fips197/fpf-2001).

  16. Testing Report submitted by MIMOS, September 4, 2009.

    Google Scholar 

  17. A. Faizul Shamsudin, Jamil Hashim, Wan Sabri Wan Yusof, & Abd Rahman Najib. (2012). The potential of Jawi ethno-mathematics in Al- Muawizzah (Protective) computing against paranormal attacks, In Proceedings Seminar Tulisan Jawi dan Teknologi, Universiti Malaysia Pahang, Gambang Pahang, Malaysia.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. Faizul Shamsudin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer Science+Business Media Singapore

About this paper

Cite this paper

Shamsudin, A.F., Alinor, M. (2015). Development of Ethno-mathematics of Al-Qur’an, Al-Hadith, and Jawi Scripts for Computer Security. In: Omar, R., Bahrom, H., de Mello, G. (eds) Islamic perspectives relating to business, arts, culture and communication. Springer, Singapore. https://doi.org/10.1007/978-981-287-429-0_1

Download citation

Publish with us

Policies and ethics