PARAMETRIC ELLIPTIC CURVE IN DATA PROTECTION IN NETWORKS PROTOCOL ANALYSIS BASED ON LINES

PARAMETRIC ELLIPTIC CURVE IN DATA PROTECTION IN NETWORKS PROTOCOL ANALYSIS BASED ON LINES

Authors

  • Rustamov Alisher Bahodirovich PhD, Karshi branch of the Tashkent University of Information Technologies named after Muhammad al-Khwarizmi alisher_88@mail.ru)

Keywords:

Resources, threats, privacy, integrity, information, vulnerabilities, communication tools, potential, confidentiality

Abstract

The rapid development of information technologies on a global scale creates new problems along with conveniences. Where computer technologies are highly developed, there first of all the sudden failure of application programs, attacks on software and information, and computer crimes. To this day, the means of cryptographic protection of information is one of the urgent issues of ensuring information security.

References

Брюс Шнайер «Прикладная криптография. Протокол, алгоритм», Исходные тексты на языке С.И. – М.: ТРИУМФ, 2002.

Filatova, S. Chernishova "Authentication in computer systems", 2005.

Смарт Н., "Криптография", М. - Техносфера, 2005. 528 с.

T. El Gamal, A Public-key Cryptosystem and a Signature Based on Discrete Logarithms. IEEE Trans. Inform. Theory, Vol. IT-31,pp.469-472, July 1985.

Miller V. Use of elliptic curves in cryptography // Advances in cryptology — CRYPTO’85 (Santa Barbara, Calif., 1985). 1986. (Lecture Notes in Comput. Sci.; V. 218).

P.F.Xasanov, X.P.Xasanov, O.P.Axmedova, A.B.Davlatov «Kriptotahlil va uning maxsus usullari» – Toshkent, 2010 – 175 bet.

X.P.Xasanov Takomillashgan diamatrisalar algebralari va parametrli algebra asosida kriptotizimlar yaratish usullari va algoritmlari. Toshkent, FTMTM, 2008.

Published

2023-06-22
Loading...