BULUTLI MA’LUMOTLAR OMBORINING HIMOYALANISH DARAJASINI OSHIRISH UCHUN AUTENTIFIKATSIYALANGAN SHIFRLASH USULIDAN FOYDALANISH
Keywords:
shifrlash, himoyalanish, bulutli saqlash, autentifikatsiyalangan shifrlashAbstract
Autentifikatsiyalangan shifrlash (ya’ni shifrlash va o‘zaro bog‘liq funksiyalarni bir vaqtda bajarish jarayoni) ma’lumotlarning maxfiyligini, yaxlitligi ustidan nazoratni va ularning haqiqiyligini ta’minlash uchun mo‘ljallangan. Umumiy kalitlarga ega bo‘lgan tomonlar nafaqat shifrlangan xabarlar almashinuvini tashkil etishlari, balki xabarga imzoga o‘xshash maxsus qo‘shimchalar (imitovstavkalar) kiritish orqali yaxlitlikni nazorat qilish imkoniyatiga ham ega bo‘ladilar. Bu esa qabul qilingan xabarning haqiqiyligiga ishonch hosil qilish imkonini beradi. Autentifikatsiyalangan shifrlash ma’lum bir funksional moslashuvchanlikni ta’minlaydi: kalitlar ma’lumotlarni qayta ishlash jarayonida yangilanib turishi mumkin; xabarning faqat ayrim qismlarini shifrlash yoki shifrlangan hamda ochiq qismlarni navbatma-navbat yuborish imkoniyati mavjud; imitovstavkalar (nazorat qo‘shimchalari) ba’zan umuman bo‘lmasligi yoki aksincha, bir necha marta qo‘llanilishi mumkin. Asosan autentifikatsiyalangan shifrlash algoritmlari blokli kriptotizimlar asosida quriladi. Ularning ayrimlari klassik yondashuvni taqlid qilib, ikki kalitdan foydalanishni istisno etadi, boshqalari esa butunlay yangi, original konstruktsiyalardir.
References
1. Bertoni, G., Daemen, J., Peeters, M., & Van Assche, G. (2011). The Keccak reference. Submission to NIST (Round 3).
2. McGrew, D. A., & Viega, J. (2004). The Galois/Counter Mode of operation (GCM). Submission to NIST. https://csrc.nist.gov
3. Whiting, D., Housley, R., & Ferguson, N. (2003). Counter with CBC-MAC (CCM). NIST Submission. https://csrc.nist.gov
4. Bellare, M., Rogaway, P., & Wagner, D. (2003). EAX: A conventional authenticated-encryption mode. In FSE 2003 (pp. 389–407). Springer.
5. Bertoni, G., Daemen, J., Peeters, M., & Van Assche, G. (2011). Cryptographic sponge functions. https://keccak.team
6. Author(s) unknown. (n.d.). Bash-f: A sponge-based cryptographic function (technical report/preprint). [Update with correct authorship & venue].
7. Hellman, M. E. (1980). A cryptanalytic time-memory trade-off. IEEE Transactions on Information Theory, 26(4), 401–406.
8. Biryukov, A., & Shamir, A. (2000). Cryptanalytic time/memory/data tradeoffs for stream ciphers. In ASIACRYPT 2000 (pp. 1–13). Springer.
9. Oechslin, P. (2003). Making a faster cryptanalytic time-memory trade-off. In CRYPTO 2003 (pp. 617–630). Springer.
10. Dworkin, M. (2015). SHA-3 Standard: Permutation-based hash and extendable-output functions (FIPS 202). NIST.
Downloads
Published
Issue
Section
License
Copyright (c) 2026 O‘rinov Nodirbek Toxirjonovich, Akbarova Madina Shavkatbek qizi

This work is licensed under a Creative Commons Attribution 4.0 International License.







