Mishal Almazrooie,Azman Samsudin,MohdAdib Omar,Muhammad SyukriSalleh,Shahir Akram Hassan,



Holy Quran,Hash function,Graphic Processing Units (GPUs),CUDA,


The Digital Holy Quran is getting more popular among Muslims nowadays. Therefore, proper precaution has to be taken to preserve the authenticity of the Digital Holy Quran. Hence, the following study shows as how the attacks on the authenticity of the Digital Quran can be mounted. In this work, we present an approach of collision attack on Quranic hash tables in which the output is a readable Arabic statement. The approach exploits some of the Unicode special characters in the UTF-8 Arabic set. Moreover, a second preimage attack is adopted as a case study to test the proposed collision attack. Then, a GPGPU parallel approach for the second preimage attack on the Quranic verses is presented. The results of the experiments on a 32-bit hash function show 395-fold speedups on 448- core processor for the parallel approach compared with the sequential one.


I. Alsmadi and M. Zarour. Online integrity and authentication checking for
Quran electronic versions. Appl. Comput. Informatics, vol. 13, no. 1, pp. 38–
46, 2017.
II. A. Alshareef and A. El Saddik. A Quranic quote verification algorithm for
verses authentication. in Innovations in Information Technology (IIT), 2012
International Conference on, 2012, pp. 339–343.
III. S. Talib, M. Mahmud, E. S. A. Rahman, A. Suraya, and A. A. Songib. Mobile
Quran app security vulnerabilities. (ICOCI 2015), Istanbul, Turkey, 2015.
IV. M. A. AlAhmad, I. Alshaikhli, and B. Jumaah. Protection of the Digital Holy
Quran hash digest by using cryptography algorithms. in Advanced Computer
Science Applications and Technologies (ACSAT), 2013 International
Conference on, 2013, pp. 244–249.

V. M. K. Khan and Y. M. Alginahi. The holy quran digitization: Challenges and
concerns. Life Sci. J., vol. 10, no. 2, pp. 156–164, 2013.
VI. M. F. Hilmi, M. F. Haron, O. Majid, and Y. Mustapha. Authentication of
electronic version of the Holy Quran: an information security perspective. in
Advances in Information Technology for the Holy Quran and Its Sciences
(32519), 2013 Taibah University International Conference on, 2013, pp. 61–
VII. S. Hakak, A. Kamsin, O. Tayan, M. Y. I. Idris, A. Gani, and S. Zerdoumi.
Preserving Content Integrity of Digital Holy Quran: Survey and Open
Challenges. IEEE Access, 2017.
VIII. M. Bellare and T. Kohno. Hash function balance and its impact on birthday
attacks. in International Conference on the Theory and Applications of
Cryptographic Techniques, 2004, pp. 401–418.
IX. NIST. Specification for SECURE HASH STANDARD. Federal Information
Processing Standards Publication 180-4 (NIST FIPS PUB 180-4), 2012.
X. CRYPTREC: Cryptography Research and Evaluation Committees,, Retrieved 24 August 2017.
XI. NESSIE: New European Schemes for Signatures, Integrity, and Encryption,, Retrieved 24 August 2017.
XII. F. Rob. CUDA Application Design and Development. Morgan Kaufmann
Publishers Inc. ISPN 9780123884268, San Francisco, CA, USA, 1st edition,
XIII. B. David Kirk and Wen-mei W. Hwu. Programming Massively Parallel
Processors: A Hands-on Approach. Morgan Kaufmann Publishers Inc., San
Francisco, CA, USA, 1st edition, 2010.
XIV. J. Sanders and E. Kandrot. CUDA by Example: An Introduction to General-
Purpose GPU Programming, Portable Documents. Addison-Wesley
Professional, 2017.
XV. M. Harris. How to access global memory efficiently in cuda c/c++ kernels.
http//devblogs. nvidia. com/parallelforall/how-access-global-memoryefficientlycuda-
c-kernels. Retrieved 24 August 2017.
XVI. UTF-8., Retrieved 24 August 2017.

View | Download