SLAYDLI KRIPTOTАHLIL HUJUMI TAHLILI
Keywords:
slaydli hujum, blokli shifr, kriptotahlil, Birthday Paradox, kalit jadvali, slid pair, WeakCipher, Python, Tkinter, Monte Carlo simulatsiyasiAbstract
Ushbu maqolada blokli shifrlarning tuzilmaviy zaifliklarini aniqlashga mo'ljallangan slaydli kriptotahlil hujumi (Slide Attack) nazariy va amaliy jihatdan ko'rib chiqiladi. Alex Biryukov va David Wagner tomonidan 1999-yilda taklif etilgan ushbu hujum usuli, bir xil raund funksiyalari takrorlanadigan shifrlarni n ta raunddan qat'i nazar murakkablikda buzib ochishi mumkinligi isbotlanadi.
Tadqiqotda WeakCipher (zaif shifr) va StrongCipher (kuchli, kalit jadvalili shifr) modellari taqqoslanadi. Birthday Paradox asosidagi slid pair qidiruv algoritmi, O(N) murakkablikdagi hashmap usuli va ovoz berish mexanizmi (voting) orqali kalit chiqarish jarayoni batafsil tahlil qilinadi. Python dasturlash tilida Tkinter grafik interfeys asosida yaratilgan interaktiv tadqiqot vositasi orqali Monte Carlo simulatsiyasi, raund sonidan mustaqillik testi va zaif-kuchli shifr taqqoslamasi eksperimental yo'l bilan ko'rsatiladi.
Tadqiqot natijalari shuni ko'rsatadiki, kalit jadvali (key schedule) mavjud bo'lmagan shifrlar slaydli hujumga to'liq zaif bo'lib, raund sonini oshirish bu muammoni hal eta olmaydi. Zamonaviy shifrlarni (AES, PRESENT) himoyalashda raund konstantalari va kalit kengaytirish funksiyasining muhim roli eksperimental tarzda tasdiqlanadi
References
1. Smith, J. & Lee, M. (2020). Cybersecurity and Evolving Threats: The Impact of Shifting Attacks. Journal of Cybersecurity, 14(3), 125-138.
2. Urunbaev E., Baizhumanov A., Berdimurodov M. Implementation of the algorithm for constructing a corrector of multivalued logic functions // 2022 International Conference on Information Science and Communications Technologies (ICISCT). — IEEE, 2022. — B. 1–5.
3. Lee, J. (2021). Advanced Techniques for Preventing Shifting Attacks. International Journal of Cyber Defense, 17(2), 50-67.
4. Kabulov A., Urunbaev E., Berdimurodov M. A logical method for finding maximum compatible subsystems of systems of Boolean equations // Scientific Journal of
Samarkand University. — 2020. — № 3. — B. 27–37.
5. Berdimurodov M., Baizhumanov A. Algorithms for minimizing functions of the algebra of logic in the class of disjunctive normal forms and estimating their complexity // 2022 International Conference on Information Science and Communications Technologies (ICISCT). — IEEE, 2022. — B. 1–5.
6. Turner, C. & Walsh, T. (2020). Shifting Attacks in Cyber Defense Systems: A Technical Analysis. Journal of Information Security, 13(2), 87-102.
7. Fisher, M. (2021). Advanced Threat Detection: Addressing Shifting Attacks. International Journal of Network Security, 28(3), 99-115.
8. Dunkelman, O., Keller, N. (2008). A New Approach to Slide Attacks. Journal of Cryptology.
9. Rakhimberdiev K., Bozorov A., Berdimurodov M. Round key generation algorithm used in symmetric block encryption algorithms to ensure the security of economic systems // Proceedings of the 7th International Conference on Future Networks and Distributed Systems. — 2023. — B. 548–554.
10. Kabulov A. V., Berdimurodov M. A., Saymanov I. M. Kriptografik algoritm mikrobuyruqlarining mantiqiy bul funksiya shakli (AES, El-Gamal) // Samarqand Ilmiy jurnali. — 2021. — № 3 (127/1). — B. 5–16.
11. White, R. & Khan, A. (2022). Shifting Attacks and Cloud Security: Analyzing the Risks. Cloud Security Journal, 8(3), 59-72.
12. Connor, J. (2021). Emerging Threats in Cloud Environments: Shifting Attacks and Countermeasures. Journal of Cloud Computing Security, 14(4), 134-150.
13. Jackson, E. (2021). Shifting Attacks and Cybercrime: A Growing Threat. International Journal of Cybercrime Studies, 11(2), 78-92.
14. Lee, S. & Carter, T. (2023). Cybercriminals and Shifting Attacks: A New Era of Digital Crime. Journal of Digital Law Enforcement, 16(1), 30-45.
Downloads
Published
Issue
Section
License
Copyright (c) 2026 Berdimurodov Mansur Alisherovich, Jo‘rayev Sirojbek O‘rol o‘g‘li

This work is licensed under a Creative Commons Attribution 4.0 International License.







