24. Al-Nur/The Light
I/We begin by the Blessed Name of Allah
The Immensely Merciful to all, The Infinitely Compassionate to everyone.
24:01
This is a Surah that WE have sent down, and made its Injunctions mandatory to be applied in matters of ethics, mannerism, and morality,
and WE have sent down Clear Messages in it so that you may contemplate and enact.
24:02
The adulterous and fornicator female and the adulterous and fornicator male, where both are equally guilty of engaging in an extramarital relationship, flog each one of them a hundred lashes.
And let no compassion, pity, or sympathy for both of them keep you away from executing the command of Allah’s Religion, if you truly believe in Allah – the One and Only God of everyone, and the Last Hour.
And ensure that a group of believers witness their punishment.
24:03
After the punishment has been executed the adulterous or fornicator male will not marry anyone but an adulterous or fornicator female, or a polytheist female.
And the adulterous or fornicator female will only marry an adulterous or fornicator male, or a polytheist male.
But marrying someone guilty of adultery or fornication is forbidden for the believers.
24:04
And those who falsely accuse a chaste/respectable lady of an extramarital affair on circumstantial evidence but then do not bring four eye witnesses in support of their accusation,
then flog them eighty lashes,
and never accept their testimony ever again.
And those - they are the ones who have overstepped the limits.
24:05
Exceptions are those who later repent and reform themselves,
for sure, Allah is All-Forgiving, All-Compassionate.
24:06
And as for those...
This research paper will discuss the position of khula in case of without husband's consent or with husband's consent. All jurists and scholars unanimously said that khula is purely a transaction between husband and wife and which entirely depends upon them. Neither party is to compel to another party to implement khula. There should and must be basically hatred or aversion on the part of one or both of the parties pertaining to a strong wish to annul the marriage contract or any other feeling to produce such an effect. The present study is aimed to focus exceptional position of women in Islamic jurisprudence in order to formulate certain conditions of khula and its implementations. Conditions have been made clear in Islamic jurisprudence. In case of without consent of husband, the jurists have difference of opinion. If husband is not ready to give his consent, judiciary can give unilateral decision without his consent
Compression of data has become a worldwide phenomenon during the past few decades for reason of achieving savings in band-width (BW) and hence makes it cost effective. The widespread practice of encryption of data has generated interest for many decades and it mainly aims at protection of data. Combining these two apparently contrary processes (in terms of BW) is quite challenging. Whereas the research on concurrent data compression and data protection (encryption) is still on, the methodology adopted by the author is unique and quite new. The most important aim of data compression technique is the need for curtailing the data storage and communication expenses. The source message (long) is converted to a codeword (small). The key objective of data encryption is to guard the integrity of data if it is intercepted by an eavesdropper. The plaintext is transformed in to ciphertext using an encryption key or keys. Combining the processes of compression and encryption together must be done in this order, that is, compression followed by encryption because all compression techniques heavily rely on the redundancies inherently part of a regular text or speech. The speech compression has been achieved using Lempel-Ziv 78 algorithm and a new algorithm for encryption/decryption, named ―The RandomOne, abbreviated as TR-1‖ is developed during this study and is thoroughly tested. The results obtained are quite encouraging. Firstly, contrary to the use of conventional methods the algorithm developed in this study does not use exclusive-OR (XOR) operation in Permutation (P) and Distribution (D) boxes for producing ciphertext from the plaintext. In this scheme pseudo random number (PRN) is used only to deceive the intruder by adding more confusion (meaning compared to the confusion due to the use of some tested algorithms used in this research). In fact only the sender of information and the intended recipient (not intruders) should be aware of the 44 bit positions filled by the PRN in a 128 word. The intended recipient discards these during deciphering process at the right time (these are disposed of before performing the inverse mapping in the P-Box). Secondly, protection against attacks is further ensured by using two supplementary keys, one for the P-Box, and another for the D-box. In addition the routine key-set of the N selected algorithms further enhances the security. In a small set-up, the distribution of key-set can be mutually agreed upon by the users; but in a large set-up, the distribution of these sets can be accomplished using standard key distribution techniques. Moreover, the proposed algorithm also differs from the other methods currently in use due to deployment of a ―sentinel marker”; which is not adopted by other algorithms and this proposal is purely the brain child of the author. The sentinel marker is part of the secret key which is pre-decided and predetermined by the sender and the intended recipient of the information. Twenty bits (out of a total of 128) are used for the sentinel marker which amounts to 2^20 = 1,048,576 possibilities combined with 2^44 = 17.6 trillion possibilities of the ciphertext produced by the PRN. The job for the cryptanalyst to break this cipher becomes formidable and a fool-proof security of data is ensured.