KVANT MUHITIDA QUVVAT TAHLILI HUJUMLARI VA KRIPTOGRAFIK SXEMALARNI LOYIHALASH

KVANT MUHITIDA QUVVAT TAHLILI HUJUMLARI VA KRIPTOGRAFIK SXEMALARNI LOYIHALASH

Authors

  • Safoyev Nuriddin Najmiddin o‘g‘li Muhammad al-Xorazmiy nomidagi TATU, Kiberxavfsizlik va kriminalistika kafedrasi

Keywords:

quvvat tahlili hujumi, tasodifiy sonlar generatsiyasi, psevdotasodifiy generator, entropiya, kriptografiya, simulyatsiya.

Abstract

Quantum-dot Cellular Automata (QCA) — past energiya sarfi, yuqori zichlik va katta tezlikka ega bo‘lgan istiqbolli post-CMOS nanotexnologiya bo‘lib, uni kriptografik sxemalarni loyihalashda qo‘llash bo‘yicha izlanishlar kengayib bormoqda. Shunga qaramay, QCA asosidagi kriptoarxitekturalar quvvat tahlili hujumlari (Power Analysis Attacks, PAA)ga nisbatan sezilarli darajada zaif bo‘lib qolmoqda. Ushbu maqolada Serpent blok shifri, A5/1 oqim shifri hamda QCA asosida qurilgan haqiqiy tasodifiy sonlar generatorlarining (TRNG) barqarorligi baholanadi. Shuningdek, QCA qurilmalarida quvvat iste’moli modellari, xavfsizlik va samaradorlik o‘rtasidagi muvozanat, hamda nano va kvant kommunikatsiya tizimlarida qo‘llanishi mumkin bo‘lgan yangi himoya yondashuvlari ko‘rib chiqiladi.

References

Chan, W. K. (2009). Random Number Generation in Simulation.

Gutterman, Z., Pinkas, B., & Reinman, T. (2006). Analysis of the Linux Random Number Generator.

Haahr, M. (2011). Introduction to Randomness and Random Numbers.

Marsaglia, G. (2005). Random Number Generators.

Schneier, B. (2007). Dual_EC_DRBG: A Case Study in Backdoors.

Sunar, B., Martin, W., & Stinson, D. (2006). A Provably Secure True Random Number Generator.

Eastlake, D., Schiller, J., & Crocker, S. (2005). Randomness Requirements for Security. RFC 4086. https://www.rfc-editor.org/rfc/rfc4086

Gutterman, Z., Pinkas, B., & Reinman, T. (2006). Analysis of the Linux Random Number Generator. IEEE Symposium on Security and Privacy. https://doi.org/10.1109/SP.2006.26

Dorrendorf, L., Gutterman, Z., & Pinkas, B. (2007). Cryptanalysis of the Random Number Generator of the Windows Operating System. ACM CCS. https://doi.org/10.1145/1315245.1315274

Lacharme, P. (2012). Security flaws in Linux's /dev/random. https://eprint.iacr.org/2012/251

Kelsey, J., Schneier, B., Ferguson, N. (1999). Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator. https://www.schneier.com/paper-yarrow.pdf

Dodis, Y., et al. (2013). Security Analysis of Pseudorandom Number Generators with Input: /dev/random is not Robust. ACM CCS. https://doi.org/10.1145/2508859.2516661

National Institute of Standards and Technology. (2012). A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. NIST SP 800-22 Rev. 1a. https://doi.org/10.6028/NIST.SP.800-22r1a

Müller, T. (2013). Security of the OpenSSL PRNG. International Journal of Information Security, 12(4), 251–265. https://doi.org/10.1007/s10207-013-0213-7

Downloads

Published

2025-12-01
Loading...