TEA shifrlash algoritmi haqida (blokli)
səhifə 10/10 tarix 05.12.2023 ölçüsü 170,83 Kb. #173651
2drdh
2.5. TEA shifrlash algoritmi haqida (blokli)
TEA shifrlash algoritmi Simmetrik blokli shifrlash algoritmi hisoblanadi.
2.4-rasm. TEA shifrlash algoritmi.
https://ikiwi.net.ar/calculadoras/tna-a-tea/ biz bu link orqali TEA shifrlash algoritmi orqali bevosita ma’lumotlarni shifrlashimiz mumkin.
Xulosa.
Xulosa qilib shuni aytadigan bo’lsam Kiberxavfsizlik fani ma’lumotlarni xavfsizligini taminlaydi. Ya’ni ma’lumotlarga bo’layotgan xujumlardan himoya qiladi. Bevosita buni kriptalogiya o’rganadi.
Kriptalogiya asosan ikka bo’lib o’rgandik: Simmetrik shifrlash algoritmi va Assimetrik shifrlash algoritmi.
Demak simmetrik shifrlash algoritmida kalitlar teng bo’ladi ya’ni k1 =k2 . Simmetrik shifrlash algoritmi ham o’z novbatida ikkiga bo’linadi Simmetrik blokli shifrlash algoritmi va Simmetrik oqimli shifrlash algoritmi.
Simmetrik oqimli shifrlash algoritmiga misol qilib A5/1 shifrlash algoritmi , RC4 shifrlash algoritmini olishimiz mumkin.
Simmetrik blokli shifrlash algoritmiga misol qilib DES shifrlash algoritmi , AES shifrlash algoritmi , TEA shifrlash algoritmi , Blowfish , Twofish kabi shifrlash algoritmlarini olishimiz mumkin.
Assimetrik shifrlash algoritmida esa kalitlar ikki xil bo’ladi ya’ni k1 ≠ k2 bo’ladi. Bu shifrlash algoritmni Ochiq kalitli krptotizmlar deb ham ataymiz. Qisqa qilib aytganda men Simmetrik shifrlash algoritmiga tushundim va qo’limdan kelganicha yoritishga harakat qildim.
Foydalanilgan adabiyotlar ro’yxati.
Information Technology Security Evaluation Criteria (ITSEC), Provisional Harmonized Criteria (1991) Luxembourg: Office for Official Publications of the European Communities , 1991 ISBN 92-826-3004-8, Catalogue Number: CD-71- 91-502-EN-C © ECSC-EEC-EAEC , Brussels • Luxembourg.
National Information Systems Security (InfoSec) Glossary (2000) National Security Telecommunications and Information Systems Security Committee. National Security Agency US.
Pfleeger, C.P. (1997) Security in Computing. Second Edition , Prentice Hall , Upper Saddle River.
Guttman, B. and Roback , E. (1995) An Introduction to Computer security: The NIST Handbook. DIANE Publishing.
Xasanov P.F., Xasanov X.P., Аxmedova O.P., Davlatov А.B. “Kriptotahlil va uning maxsus usullari” elektron oʼquv qoʼllanma. 2010 y.
Аkbarov D.E., Xasanov P.F., Xasanov X.P., Аxmedova O.P. “Kriptografiyaning matematik asoslari” elektron oʼquv qoʼllanma. 2010 y.
Report to Congress on Breaches of Unsecured Protected Health Information For Calendar Years 2015, 2016, and 2017. U.S. Department of Health and Human Services Office for Civil Rights.
https://www.hhs.gov/sites/default/files/breach-report-to-congress-2015-2016- 2017.pdf 28. http://smartkardtechnologies.com/productdetails/acr39u-smart-cardrader
https://www.turbosquid.com/3d-models/3d-airport-x-ray-machinesecurity-1405223 30. https://www.ptsecurity.com/ww-en/analytics/web-vulnerabilities2020/
. https://www.nuigalway.ie/itsecurity/howtospotphishingemails/
https://techjaws.com/beware-of-fake-microsoft-security-essentials/
https://www.pcmag.com/roundup/256703/the-best-antivirusprotection 34. https://www.us-cert.gov/ncas/tips/ST05-003
https://blog.layershift.com/why-high-availability-for-your-business/
https://en.wikipedia.org/wiki/Zimmermann_Telegram
Dostları ilə paylaş: