OQIMLI SHIFRLASH ALGORITMLARI BARDOSHLILIGINI DIFFERENSIAL VA ALGEBRAIK KRIPTOTAHLIL USULLARI YORDAMIDA BAHOLASH

Authors

  • Rahmatullayev Ilhom Raxmatullayevich Muhammad al-Xorazmiy nomidagi Toshkent axborot texnologiyalari universiteti Samarqand

Keywords:

Kriptografik algoritmning bardoshliligi, entropiya, oqimli shifrlash, differensial kriptotahlil, algebraik kriptotahlil

Abstract

Mazkur maqolada shifrlash algoritmlari bardoshliligi masalalari, oqimli shifrlash nazariyasi va oqimli shifrlash algoritmlariga nisbatan qo‘llaniladigan ayrim kriptotahlil usullari, xususan, differensial hamda algebraik kriptotahlil usullarining qo‘llanilishi ikkita siljish registrlaridan iborat sodda oqimli shifrlash algoritmlari misolida yoritib berilgan.

References

Whitfield Diffie and Martin E Hellman. Privacy and authentication: An introduction to cryptography. Proceedings of the IEEE, 67(3):397–427, 1979.

S.W. Golomb. Shift Register Sequences. Holden-Day Series in Information Systems. Holden-Day, 1967.

El Groth. Generation of binary sequences with controllable complexity. IEEE Transactions on Information Theory, 17(3):288–296, 1971.

Edwin Key. An analysis of the structure and complexity of nonlinear binary sequence generators. IEEE Transactions on Information Theory, 22(6):732–736, 1976.

Vera S Pless. Encryption schemes for computer confidentiality. IEEE Transactions on Computers, 100(11):1133–1136, 1977.

Eli Biham and Adi Shamir. Differential fault analysis of secret key cryptosystems. In 17th International Cryptology Conference, Advances in Cryptology (CRYPTO 1997), volume 1294 of Lecture Notes in Computer Science, pages 513–525. Springer-Verlag, 1997.

Alex Biryukov and David Wagner. Slide attacks. In 6th International Workshop on Fast Software Encryption (FSE 1999), volume 1636 of Lecture Notes in Computer Science, pages 245–259. Springer-Verlag, 1999.

Andrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger. Biclique cryptanalysis of the full AES. In 17th International Conference on the Theory and Application of Cryptology and Information Security, Advances in Cryptology (ASIACRYPT 2011), volume 7073 of Lecture Notes in Computer Science, pages 344–371. Springer-Verlag, 2011.

Dan Boneh, Richard A DeMillo, and Richard J Lipton. On the importance of checking cryptographic protocols for faults. In 16th International Conference on the Theory and Application of Cryptographic Techniques, Advances in Cryptology (EUROCRYPT 1997), volume 1233 of Lecture Notes in Computer Science, pages 37–51. Springer-Verlag, 1997.

Joan Daemen, Lars Knudsen, and Vincent Rijmen. The block cipher Square. In 4th International Workshop on Fast Software Encryption (FSE 1997), volume 1267 of Lecture Notes in Computer Science, pages 149–165. Springer-Verlag, 1997.

Donald Davies and Sean Murphy. Pairs and triplets of DES S-boxes. Journal of Cryptology, 8(1):1–25, 1995.

Itai Dinur and Adi Shamir. Cube attacks on tweakable black box polynomials. In 28th International Conference on the Theory and Application of Cryptographic Techniques, Advances in Cryptology (EUROCRYPT 2009), volume 5479 of Lecture Notes in Computer Science, pages 278–299. Springer-Verlag, 2009.

John Kelsey, Bruce Schneier, and David Wagner. Mod n cryptanalysis, with applications against RC5P and M6. In 6th International Workshop on Fast Software Encryption (FSE 1999), volume 1636 of Lecture Notes in Computer Science, pages 139–155. Springer-Verlag, 1999.

David Wagner. The boomerang attack. In 6th International Workshop on Fast Software Encryption (FSE 1999), volume 1636 of Lecture Notes in Computer Science, pages 156–170. SpringerVerlag, 1999.

Eli Biham and Adi Shamir. Differential cryptanalysis of DES-like cryptosystems. Journal of Cryptology, 4(1):3–72, 1991.

Don Coppersmith. The data encryption standard (DES) and its strength against attacks. IBM journal of research and development, 38(3):243–250, 1994.

Eli Biham and Adi Shamir. Differential cryptanalysis of the Data Encryption Standard, volume 28. Springer-Verlag, 1993.

Martin Albrecht and Carlos Cid. Algebraic techniques in differential cryptanalysis. In Fast Software Encryption, pages 193–208. Springer-Verlag, 2009.

Florent Chabaud and Serge Vaudenay. Links between differential and linear cryptanalysis. In 13th International Conference on the Theory and Application of Cryptographic Techniques, Advances in Cryptology (EUROCRYPT 1994), volume 950 of Lecture Notes in Computer Science, pages 356–365. Springer-Verlag, 1995.

Xuejia Lai, James L Massey, and Sean Murphy. Markov ciphers and differential cryptanalysis. In 10th International Conference on the Theory and Application of Cryptographic Techniques, Advances in Cryptology (EUROCRYPT 1991), volume 547 of Lecture Notes in Computer Science, pages 17–38. Springer-Verlag, 1991.

Cunsheng Ding. The differential cryptanalysis and design of natural stream ciphers. In 1st International Workshop on Fast Software Encryption (FSE 1993), volume 809 of Lecture Notes in Computer Science, pages 101–115. Springer-Verlag, 1994.

Fr´ed´eric Muller. Differential attacks against the Helix stream cipher. In 11th International Workshop on Fast Software Encryption (FSE 2004), volume 3017 of Lecture Notes in Computer Science, pages 94–108. Springer-Verlag, 2004.

Hongjun Wu and Bart Preneel. Differential-linear attacks against the stream cipher Phelix. In 14th International Workshop on Fast Software Encryption (FSE 2007), volume 4593 of Lecture Notes in Computer Science, pages 87–100. Springer-Verlag, 2007.

Flavio D. Garcia, Peter van Rossum, Roel Verdult, and Ronny Wichers Schreur. Wirelessly pickpocketing a MIFARE Classic card. In 30th IEEE Symposium on Security and Privacy (S&P 2009), pages 3–15. IEEE Computer Society, 2009.

Carlo Meijer and Roel Verdult. Ciphertext-only cryptanalysis on hardened Mifare Classic cards. In 22nd ACM Conference on Computer and Communications Security (CCS 2015). ACM, 2015.

Flavio D. Garcia, Gerhard de Koning Gans, and Roel Verdult. Exposing iClass key diversification. In 5th USENIX Workshop on Offensive Technologies (WOOT 2011), pages 128–136. USENIX Association, 2011.

Flavio D. Garcia, Gerhard de Koning Gans, and Roel Verdult. Wirelessly lockpicking a smart card reader. International Journal of Information Security, 13(5):403–420, 2014.

Flavio D. Garcia, Gerhard de Koning Gans, Roel Verdult, and Milosch Meriac. Dismantling iClass and iClass Elite. In 17th European Symposium on Research in Computer Security (ESORICS 2012), volume 7459 of Lecture Notes in Computer Science, pages 697–715. SpringerVerlag, 2012.

William Simon. Mathematical magic. Courier Dover Publications, 1964

Lester S. Hill. Cryptography in an algebraic alphabet. American Mathematical Monthly, 36(6):306–312, 1929.

Lester S Hill. Concerning certain linear transformation apparatus of cryptography. American Mathematical Monthly, pages 135–154, 1931.

James Reeds. “Cracking” a random number generator. Cryptologia, 1(1):20–26, 1977.

Frank Rubin. Decrypting a stream cipher based on J-K flip-flops. IEEE Transactions on Computers, 100(7):483–487, 1979.

Downloads

Published

2024-02-24

How to Cite

Rahmatullayev, I. (2024). OQIMLI SHIFRLASH ALGORITMLARI BARDOSHLILIGINI DIFFERENSIAL VA ALGEBRAIK KRIPTOTAHLIL USULLARI YORDAMIDA BAHOLASH . DIGITAL TRANSFORMATION AND ARTIFICIAL INTELLIGENCE, 2(1), 64–70. Retrieved from https://dtai.tsue.uz/index.php/dtai/article/view/v2i111