KVANT NUQTALI TEXNOLOGIYADA QUVVAT TAHLILI HUJUMLARI VA KRIPTOGRAFIK SXEMALARNI LOYIHALASH

Mualliflar

  • Nuriddin Safoyev Muallif

Kalit so‘zlar:

quvvat tahlili hujumi, tasodifiy sonlar generatsiyasi, psevdotasodifiy generator, entropiya, kriptografiya, simulyatsiya.

Annotasiya

Quantum-dot Cellular Automata (QCA) texnologiyasi past energiya sarfi, yuqori zichlik va tez ishlash imkoniyatlari sababli kriptografik sxemalar yaratishda istiqbolli nanotexnologiya sifatida e’tirof etilmoqda. Biroq QCA asosidagi kriptoarxitekturalar quvvat tahlili hujumlari (Power Analysis Attacks — PAA)ga nisbatan zaif bo‘lishi hali ham muhim muammo bo‘lib qolmoqda. Ushbu maqolada Serpent shifri, A5/1 oqim shifri va QCA asosida loyihalangan haqiqiy tasodifiy sonlar generatorlari (TRNG)ning himoya darajasi tahlil qilinadi. Shuningdek, QCA qurilmalaridagi quvvat iste’moli modellari, xavfsizlik va samaradorlik o‘rtasidagi muvozanat hamda nanokommunikatsiyada xavfsizlikni ta’minlash uchun yangi dizayn yondashuvlari ko‘rib chiqiladi.

Manbalar

1. Chan, W. K. (2009). Random Number Generation in Simulation.

2. Gutterman, Z., Pinkas, B., & Reinman, T. (2006). Analysis of the Linux Random Number Generator.

3. Haahr, M. (2011). Introduction to Randomness and Random Numbers.

4. Marsaglia, G. (2005). Random Number Generators.

5. Schneier, B. (2007). Dual_EC_DRBG: A Case Study in Backdoors.

6. Sunar, B., Martin, W., & Stinson, D. (2006). A Provably Secure True Random Number Generator.

7. Eastlake, D., Schiller, J., & Crocker, S. (2005). Randomness Requirements for Security. RFC 4086. https://www.rfc-editor.org/rfc/rfc4086

8. Gutterman, Z., Pinkas, B., & Reinman, T. (2006). Analysis of the Linux Random Number Generator. IEEE Symposium on Security and Privacy. https://doi.org/10.1109/SP.2006.26

9. Dorrendorf, L., Gutterman, Z., & Pinkas, B. (2007). Cryptanalysis of the Random Number Generator of the Windows Operating System. ACM CCS. https://doi.org/10.1145/1315245.1315274

10. Lacharme, P. (2012). Security flaws in Linux's /dev/random. https://eprint.iacr.org/2012/251

11. Kelsey, J., Schneier, B., Ferguson, N. (1999). Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator. https://www.schneier.com/paper-yarrow.pdf

12. Dodis, Y., et al. (2013). Security Analysis of Pseudorandom Number Generators with Input: /dev/random is not Robust. ACM CCS. https://doi.org/10.1145/2508859.2516661

13. National Institute of Standards and Technology. (2012). A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. NIST SP 800-22 Rev. 1a. https://doi.org/10.6028/NIST.SP.800-22r1a

14. Müller, T. (2013). Security of the OpenSSL PRNG. International Journal of Information Security, 12(4), 251–265. https://doi.org/10.1007/s10207-013-0213-7

##submission.downloads##

Nashr qilingan

2025-12-11

Qanday ko'rsatish

KVANT NUQTALI TEXNOLOGIYADA QUVVAT TAHLILI HUJUMLARI VA KRIPTOGRAFIK SXEMALARNI LOYIHALASH. (2025). ИССЛЕДОВАНИЯ ПО ПРИОРИТЕТНЫМ НАПРАВЛЕНИЯМ СТРАТЕГИИ РАЗВИТИЯ УЗБЕКИСТАНА, 1(4), 8-11. https://www.konferensiyalar.com/index.php/ts/article/view/211