Published December 25, 2024 | Version v2
Journal article Open

PRESENT YENGIL VAZNLI KRIPTOGRAFIK ALGORITMINING TAHLILI

  • 1. Muhammad al-Xorazmiy nomidagi Toshkent axborot texnologiyalari universiteti, "Kriptologiya" kafedrasi mudiri, Phd., dotsent, Toshkent, O'zbekiston
  • 2. Muhammad al-Xorazmiy nomidagi Toshkent axborot texnologiyalari universiteti, "Kriptologiya" kafedrasi assistenti, Toshkent, O'zbekiston

Description

Ushbu maqolada IoT qurilmalari va ularda foydalaniladigan kam resurs sarfiga ega, yengil vaznli kriptografik algoritmlar haqida qiyosiy tahlil ma'lumotlari, bajarilgan tadqiqotlar natijalari keltirilgan. Xususan, PRESENT yengil vaznli shifrlash algoritmini ishlash bosqichlari, ushbu algoritmni SPEAK shifrlash algoritmi bilan bir xil muhitida (ya'ni, CrypTool 2.1dasturida) qiyosiy tahlil qilindi. Tahlil natijalari PRESENT yengil vaznli shifrlash algoritmini IoT qurilmalarida xavfsizlik masalalariga javob bera olishi uchun takomillashtirish va roundlar sonini kamaytirish kerakligini ko'rsatdi

Files

final_25_695-152-157-Qozoqova.pdf

Files (988.3 kB)

Name Size Download all
md5:cc960f656beb644d97542c79502ddfce
988.3 kB Preview Download

Additional details

References

  • Zscaler ThreatLabz. (2024, November 22). New ThreatLabz report: Mobile remains the top threat vector with 111% spyware growth. Zscaler.
  • Rana, M.& Mamun, Q & Islam, R. Balancing Security and Efficiency: A Power Consumption Analysis of a Lightweight Block Cipher. Electronics 2024, 13, 4325. https://doi.org/ 10.3390/electronics13214325
  • Christophe De Canniere & Orr Dunkelman & Miroslav Knezevic., KATAN and KTANTAN-a family of small and efficient hardware-oriented block ciphers., Cryptographic Hardware and Embedded Systems-CHES 2009., Springer LNCS, vol. 5747, 2009, pp. 272–288.
  • J. Borghoff., PRINCE–a low-latency block cipher for pervasive computing applications., Advances in Cryptology–ASIACRYPT., Springer LNCS, vol. 7658, 2012, pp. 208–225.
  • Ray Beaulieu & Douglas Shors, Jason Smith & StefanTreatman Clark, Bryan Weeks & Louis Wingers., The SIMON and SPECK families of lightweight block ciphers., IACR Cryptology ePrint Archive (2013).
  • Deukjo Hong& Jaechul Sung, Seokhie Hong& Jongin Lim&Sangjin Lee., HIGHT: A new block cipher suitable for low-resource device., Cryptographic Hardware and Embedded Systems., Springer Berlin Heidelberg, 2006, pp. 46–59.
  • Gaurav Bansod&Nishchal Raval., Implementation of a new lightweight encryption design for embedded security, IEEE Trans. Inf. Forensics Security. 10 (1) (2015) 142–151.
  • G Hatzivasilis&K Fysarakis, I Papaestathi& H Favas., Review of light weight block ciphers., J. Cryptogr. Eng. 8 (2) (2017) 141–184.
  • Dixit R& Kumar L&Verma S, Gupta K&Jain S., An overview of lightweight cipher., CEUR Workshop Proceedings. https://doi.org/10.1016/j.aci.2018.
  • Bogdanov A&Knudsen L. Leander G& Paar "PRESENT: An ultra-lightweight block cipher"., In Workshop on Cryptographic Hardware and Embedded Systems (pp. 450-466). Springer, Berlin, Heidelberg.
  • Fernando M.& Mahmud S.& Wang S., Lightweight encryption for IoT applications: A comprehensive review., Discover Internet of Things, 3(1), 100100. https://doi.org/10.1016/j.discint.2023.100100 .
  • Qozoqova T.Q. & Shamshiyeva B.M., Applying the CryptoSMT software tool to symmetric block encryption algorithms. pp-750-754
  • Qozoqova T.Q. Teaching cryptanalysis of classic encryption methods using modern tools. «Инновации, знания, опыт – векторы образовательных треков» КНИГА I
  • https://www.zscaler.com/blogs/security-research/new-threatlabz-report-mobile-remains-top-threat-vector-111-spyware-growth