ELLIPTIK EGRI CHIZIQLARGA ASOSLANGAN SAMARALI DIFFI-XELLMAN IKKI TOMONLAMA KALIT TAQSIMLASH PROTOKOLLARI TAHLILI

##article.authors##

  • Arziyeva Jamila Tileubayevna ##default.groups.name.author##
  • Jabbarov Nuriddin Akbarovich ##default.groups.name.author##
  • Umarov Shohzod Zafar o‘g‘li ##default.groups.name.author##

##semicolon##

Kalit so‘zlar: Elliptik egri chiziqlar, kriptografiya, kalit taqsimlash, protokollar.

##article.abstract##

Kalit taqsimlash protokollari ikki (yoki undan ko‘p) tomon o‘rtasida xavfsiz bo‘lmagan tarmoq orqali aloqa maxfiyligini ta’minlash uchun asosiy ahamiyatga ega. Ushbu maqolada biz elliptik egri chiziq guruhlari ustida Diffi-Xellman va diskret logarifmlash muammolarining murakkabligiga asoslangan mavjud ikki tomonlama protokollarni ko‘rib chiqamiz. Shuningdek, yangi ikki tomonlama o‘zaro autentifikatsiyalangan kalit taqsimlash protokolini taklif qilamiz va barcha ko‘rib chiqilgan sxemalarning xavfsizligi va samaradorligini birgalikda baholaymiz. Elliptik egri chiziq texnikalari resurslari cheklangan qurilmalarda hisoblash ishlarini minimallashtirish va kamroq bit bilan xavfsizlik darajalarini ta’minlash uchun qo‘llaniladi.

##submission.citations##

1. M. Bellare and P. Rogaway. Entity authentication and key distribution. In Proceedings of CRYPTO 1993, LNCS 773:232–249, 1994.

2. S. Blake-Wilson, D. Johnson, and A. Menezes. Key agreement protocols and their security analysis. In Proceedings of the 6th IMA Int.l Conf on

3. ANSI-X9.62-1998. Public key cryptography for the financial services: The elliptic curve digital signature algorithm (ECDSA). American National Standards Institute, 1999.

4. IEEE-P1363-2000. Standard specifications for public key cryptography. Institute of Electrical and Electronics Engineers, 2000.

5. L. Law, A. Menezes, M. Qu, J. Solinas, and S. Vanstone. An efficient protocol for authenticated key agreement. Designs, Codes and Cryptography, pages 28:119–134, 2003.

6. T. Matsumoto, Y. Takashima, and H. Imai. On seeking smart public-key distribution systems. Transactions of IEICE, VolE69:99–106, 1986.

7. B. Kaliski. An unknown key share attack on the MQV key agreement protocol. ACM Transactions on Information and System Security, pages 36–49, 2001.

8. C. Lee, J. Lim, and J. Kim. An efficient and secure key agreement. IEEE p1363a draft, 1998.

9. B. Song and K. Kim. Two-pass authenticated key agreement protocol with key confirmation. Progress in Cryptology - Indocrypt 2000, LNCS 1977:237–249, 2000.

10. K. Al-Sultan, M. Saeb, M. Elmessiery, and U.A.Badawi. A new two-pass key agreement protocol. Proceedings of the IEEE Midwest 2003 Symp. On Circuits, Systems and Computers, 2003.

##submissions.published##

2024-11-26