KVANT MUHITIDA QUVVAT TAHLILI HUJUMLARI VA KRIPTOGRAFIK SXEMALARNI LOYIHALASH
Keywords:
quvvat tahlili hujumi, tasodifiy sonlar generatsiyasi, psevdotasodifiy generator, entropiya, kriptografiya, simulyatsiya.Abstract
Quantum-dot Cellular Automata (QCA) — past energiya sarfi, yuqori zichlik va katta tezlikka ega bo‘lgan istiqbolli post-CMOS nanotexnologiya bo‘lib, uni kriptografik sxemalarni loyihalashda qo‘llash bo‘yicha izlanishlar kengayib bormoqda. Shunga qaramay, QCA asosidagi kriptoarxitekturalar quvvat tahlili hujumlari (Power Analysis Attacks, PAA)ga nisbatan sezilarli darajada zaif bo‘lib qolmoqda. Ushbu maqolada Serpent blok shifri, A5/1 oqim shifri hamda QCA asosida qurilgan haqiqiy tasodifiy sonlar generatorlarining (TRNG) barqarorligi baholanadi. Shuningdek, QCA qurilmalarida quvvat iste’moli modellari, xavfsizlik va samaradorlik o‘rtasidagi muvozanat, hamda nano va kvant kommunikatsiya tizimlarida qo‘llanishi mumkin bo‘lgan yangi himoya yondashuvlari ko‘rib chiqiladi.
References
Chan, W. K. (2009). Random Number Generation in Simulation.
Gutterman, Z., Pinkas, B., & Reinman, T. (2006). Analysis of the Linux Random Number Generator.
Haahr, M. (2011). Introduction to Randomness and Random Numbers.
Marsaglia, G. (2005). Random Number Generators.
Schneier, B. (2007). Dual_EC_DRBG: A Case Study in Backdoors.
Sunar, B., Martin, W., & Stinson, D. (2006). A Provably Secure True Random Number Generator.
Eastlake, D., Schiller, J., & Crocker, S. (2005). Randomness Requirements for Security. RFC 4086. https://www.rfc-editor.org/rfc/rfc4086
Gutterman, Z., Pinkas, B., & Reinman, T. (2006). Analysis of the Linux Random Number Generator. IEEE Symposium on Security and Privacy. https://doi.org/10.1109/SP.2006.26
Dorrendorf, L., Gutterman, Z., & Pinkas, B. (2007). Cryptanalysis of the Random Number Generator of the Windows Operating System. ACM CCS. https://doi.org/10.1145/1315245.1315274
Lacharme, P. (2012). Security flaws in Linux's /dev/random. https://eprint.iacr.org/2012/251
Kelsey, J., Schneier, B., Ferguson, N. (1999). Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator. https://www.schneier.com/paper-yarrow.pdf
Dodis, Y., et al. (2013). Security Analysis of Pseudorandom Number Generators with Input: /dev/random is not Robust. ACM CCS. https://doi.org/10.1145/2508859.2516661
National Institute of Standards and Technology. (2012). A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. NIST SP 800-22 Rev. 1a. https://doi.org/10.6028/NIST.SP.800-22r1a
Müller, T. (2013). Security of the OpenSSL PRNG. International Journal of Information Security, 12(4), 251–265. https://doi.org/10.1007/s10207-013-0213-7