KVANT NUQTALI TEXNOLOGIYADA QUVVAT TAHLILI HUJUMLARI VA KRIPTOGRAFIK SXEMALARNI LOYIHALASH
Ключевые слова:
quvvat tahlili hujumi, tasodifiy sonlar generatsiyasi, psevdotasodifiy generator, entropiya, kriptografiya, simulyatsiya.Аннотация
Quantum-dot Cellular Automata (QCA) texnologiyasi past energiya sarfi, yuqori zichlik va tez ishlash imkoniyatlari sababli kriptografik sxemalar yaratishda istiqbolli nanotexnologiya sifatida e’tirof etilmoqda. Biroq QCA asosidagi kriptoarxitekturalar quvvat tahlili hujumlari (Power Analysis Attacks — PAA)ga nisbatan zaif bo‘lishi hali ham muhim muammo bo‘lib qolmoqda. Ushbu maqolada Serpent shifri, A5/1 oqim shifri va QCA asosida loyihalangan haqiqiy tasodifiy sonlar generatorlari (TRNG)ning himoya darajasi tahlil qilinadi. Shuningdek, QCA qurilmalaridagi quvvat iste’moli modellari, xavfsizlik va samaradorlik o‘rtasidagi muvozanat hamda nanokommunikatsiyada xavfsizlikni ta’minlash uchun yangi dizayn yondashuvlari ko‘rib chiqiladi.
Библиографические ссылки
1. Chan, W. K. (2009). Random Number Generation in Simulation.
2. Gutterman, Z., Pinkas, B., & Reinman, T. (2006). Analysis of the Linux Random Number Generator.
3. Haahr, M. (2011). Introduction to Randomness and Random Numbers.
4. Marsaglia, G. (2005). Random Number Generators.
5. Schneier, B. (2007). Dual_EC_DRBG: A Case Study in Backdoors.
6. Sunar, B., Martin, W., & Stinson, D. (2006). A Provably Secure True Random Number Generator.
7. Eastlake, D., Schiller, J., & Crocker, S. (2005). Randomness Requirements for Security. RFC 4086. https://www.rfc-editor.org/rfc/rfc4086
8. Gutterman, Z., Pinkas, B., & Reinman, T. (2006). Analysis of the Linux Random Number Generator. IEEE Symposium on Security and Privacy. https://doi.org/10.1109/SP.2006.26
9. Dorrendorf, L., Gutterman, Z., & Pinkas, B. (2007). Cryptanalysis of the Random Number Generator of the Windows Operating System. ACM CCS. https://doi.org/10.1145/1315245.1315274
10. Lacharme, P. (2012). Security flaws in Linux's /dev/random. https://eprint.iacr.org/2012/251
11. Kelsey, J., Schneier, B., Ferguson, N. (1999). Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator. https://www.schneier.com/paper-yarrow.pdf
12. Dodis, Y., et al. (2013). Security Analysis of Pseudorandom Number Generators with Input: /dev/random is not Robust. ACM CCS. https://doi.org/10.1145/2508859.2516661
13. National Institute of Standards and Technology. (2012). A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. NIST SP 800-22 Rev. 1a. https://doi.org/10.6028/NIST.SP.800-22r1a
14. Müller, T. (2013). Security of the OpenSSL PRNG. International Journal of Information Security, 12(4), 251–265. https://doi.org/10.1007/s10207-013-0213-7
Загрузки
Опубликован
Выпуск
Раздел
Лицензия

Это произведение доступно по лицензии Creative Commons «Attribution» («Атрибуция») 4.0 Всемирная.
This work is licensed under a