Kiber-huquq va kiber-etika
TEA shifrlash algoritmi haqida (blokli)
Download 1.04 Mb.
|
Kiber-huquq va kiber-etika Saidxonov
- Bu sahifa navigatsiya:
- Foydalanilgan adabiyotlar ro’yxati.
2.5. TEA shifrlash algoritmi haqida (blokli)
TEA shifrlash algoritmi Simmetrik blokli shifrlash algoritmi hisoblanadi. 2.4-rasm. TEA shifrlash algoritmi. https://ikiwi.net.ar/calculadoras/tna-a-tea/ biz bu link orqali TEA shifrlash algoritmi orqali bevosita ma’lumotlarni shifrlashimiz mumkin. Xulosa. Xulosa qilib shuni aytadigan bo’lsam Kiberxavfsizlik fani ma’lumotlarni xavfsizligini taminlaydi. Ya’ni ma’lumotlarga bo’layotgan xujumlardan himoya qiladi. Bevosita buni kriptalogiya o’rganadi. Kriptalogiya asosan ikka bo’lib o’rgandik: Simmetrik shifrlash algoritmi va Assimetrik shifrlash algoritmi. Demak simmetrik shifrlash algoritmida kalitlar teng bo’ladi ya’ni k1=k2 . Simmetrik shifrlash algoritmi ham o’z novbatida ikkiga bo’linadi Simmetrik blokli shifrlash algoritmi va Simmetrik oqimli shifrlash algoritmi. Simmetrik oqimli shifrlash algoritmiga misol qilib A5/1 shifrlash algoritmi , RC4 shifrlash algoritmini olishimiz mumkin. Simmetrik blokli shifrlash algoritmiga misol qilib DES shifrlash algoritmi, AES shifrlash algoritmi, TEA shifrlash algoritmi, Blowfish, Twofish kabi shifrlash algoritmlarini olishimiz mumkin. Assimetrik shifrlash algoritmida esa kalitlar ikki xil bo’ladi ya’ni k1 ≠ k2 bo’ladi. Bu shifrlash algoritmni Ochiq kalitli krptotizmlar deb ham ataymiz. Qisqa qilib aytganda men Simmetrik shifrlash algoritmiga tushundim va qo’limdan kelganicha yoritishga harakat qildim. Foydalanilgan adabiyotlar ro’yxati. Information Technology Security Evaluation Criteria (ITSEC), Provisional Harmonized Criteria (1991) Luxembourg: Office for Official Publications of the European Communities, 1991 ISBN 92-826-3004-8, Catalogue Number: CD-71- 91-502-EN-C © ECSC-EEC-EAEC, Brussels • Luxembourg. National Information Systems Security (InfoSec) Glossary (2000) National Security Telecommunications and Information Systems Security Committee. National Security Agency US. Pfleeger, C.P. (1997) Security in Computing. Second Edition, Prentice Hall, Upper Saddle River. Guttman, B. and Roback, E. (1995) An Introduction to Computer security: The NIST Handbook. DIANE Publishing. Xasanov P.F., Xasanov X.P., Аxmedova O.P., Davlatov А.B. “Kriptotahlil va uning maxsus usullari” elektron oʼquv qoʼllanma. 2010 y. Аkbarov D.E., Xasanov P.F., Xasanov X.P., Аxmedova O.P. “Kriptografiyaning matematik asoslari” elektron oʼquv qoʼllanma. 2010 y. Report to Congress on Breaches of Unsecured Protected Health Information For Calendar Years 2015, 2016, and 2017. U.S. Department of Health and Human Services Office for Civil Rights. https://www.hhs.gov/sites/default/files/breach-report-to-congress-2015-2016- 2017.pdf 28. http://smartkardtechnologies.com/productdetails/acr39u-smart-cardrader https://www.turbosquid.com/3d-models/3d-airport-x-ray-machinesecurity-1405223 30. https://www.ptsecurity.com/ww-en/analytics/web-vulnerabilities2020/ . https://www.nuigalway.ie/itsecurity/howtospotphishingemails/ https://techjaws.com/beware-of-fake-microsoft-security-essentials/ https://www.pcmag.com/roundup/256703/the-best-antivirusprotection 34. https://www.us-cert.gov/ncas/tips/ST05-003 https://blog.layershift.com/why-high-availability-for-your-business/ https://en.wikipedia.org/wiki/Zimmermann_Telegram Download 1.04 Mb. Do'stlaringiz bilan baham: |
Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling
ma'muriyatiga murojaat qiling