BULUTLI MA’LUMOTLAR OMBORINING HIMOYALANISH DARAJASINI OSHIRISH UCHUN AUTENTIFIKATSIYALANGAN SHIFRLASH USULIDAN FOYDALANISH

Authors

  • O‘rinov Nodirbek Toxirjonovich Zahiriddin Muhammad Bobur nomidagi Andijon davlat universiteti
  • Akbarova Madina Shavkatbek qizi Zahiriddin Muhammad Bobur nomidagi Andijon davlat universiteti

Keywords:

shifrlash, himoyalanish, bulutli saqlash, autentifikatsiyalangan shifrlash

Abstract

Autentifikatsiyalangan shifrlash (ya’ni shifrlash va o‘zaro bog‘liq funksiyalarni bir vaqtda bajarish jarayoni) ma’lumotlarning maxfiyligini, yaxlitligi ustidan nazoratni va ularning haqiqiyligini ta’minlash uchun mo‘ljallangan. Umumiy kalitlarga ega bo‘lgan tomonlar nafaqat shifrlangan xabarlar almashinuvini tashkil etishlari, balki xabarga imzoga o‘xshash maxsus qo‘shimchalar (imitovstavkalar) kiritish orqali yaxlitlikni nazorat qilish imkoniyatiga ham ega bo‘ladilar. Bu esa qabul qilingan xabarning haqiqiyligiga ishonch hosil qilish imkonini beradi. Autentifikatsiyalangan shifrlash ma’lum bir funksional moslashuvchanlikni ta’minlaydi: kalitlar ma’lumotlarni qayta ishlash jarayonida yangilanib turishi mumkin; xabarning faqat ayrim qismlarini shifrlash yoki shifrlangan hamda ochiq qismlarni navbatma-navbat yuborish imkoniyati mavjud; imitovstavkalar (nazorat qo‘shimchalari) ba’zan umuman bo‘lmasligi yoki aksincha, bir necha marta qo‘llanilishi mumkin. Asosan autentifikatsiyalangan shifrlash algoritmlari blokli kriptotizimlar asosida quriladi. Ularning ayrimlari klassik yondashuvni taqlid qilib, ikki kalitdan foydalanishni istisno etadi, boshqalari esa butunlay yangi, original konstruktsiyalardir.

References

1. Bertoni, G., Daemen, J., Peeters, M., & Van Assche, G. (2011). The Keccak reference. Submission to NIST (Round 3).

2. McGrew, D. A., & Viega, J. (2004). The Galois/Counter Mode of operation (GCM). Submission to NIST. https://csrc.nist.gov

3. Whiting, D., Housley, R., & Ferguson, N. (2003). Counter with CBC-MAC (CCM). NIST Submission. https://csrc.nist.gov

4. Bellare, M., Rogaway, P., & Wagner, D. (2003). EAX: A conventional authenticated-encryption mode. In FSE 2003 (pp. 389–407). Springer.

5. Bertoni, G., Daemen, J., Peeters, M., & Van Assche, G. (2011). Cryptographic sponge functions. https://keccak.team

6. Author(s) unknown. (n.d.). Bash-f: A sponge-based cryptographic function (technical report/preprint). [Update with correct authorship & venue].

7. Hellman, M. E. (1980). A cryptanalytic time-memory trade-off. IEEE Transactions on Information Theory, 26(4), 401–406.

8. Biryukov, A., & Shamir, A. (2000). Cryptanalytic time/memory/data tradeoffs for stream ciphers. In ASIACRYPT 2000 (pp. 1–13). Springer.

9. Oechslin, P. (2003). Making a faster cryptanalytic time-memory trade-off. In CRYPTO 2003 (pp. 617–630). Springer.

10. Dworkin, M. (2015). SHA-3 Standard: Permutation-based hash and extendable-output functions (FIPS 202). NIST.

Downloads

Published

2026-02-16

How to Cite

BULUTLI MA’LUMOTLAR OMBORINING HIMOYALANISH DARAJASINI OSHIRISH UCHUN AUTENTIFIKATSIYALANGAN SHIFRLASH USULIDAN FOYDALANISH. (2026). DIGITAL TRANSFORMATION AND ARTIFICIAL INTELLIGENCE, 4(1), 24-31. https://dtai.tsue.uz/index.php/dtai/article/view/v4i13