PARAMETRIC ELLIPTIC CURVE IN DATA PROTECTION IN NETWORKS PROTOCOL ANALYSIS BASED ON LINES
Keywords:
Resources, threats, privacy, integrity, information, vulnerabilities, communication tools, potential, confidentialityAbstract
The rapid development of information technologies on a global scale creates new problems along with conveniences. Where computer technologies are highly developed, there first of all the sudden failure of application programs, attacks on software and information, and computer crimes. To this day, the means of cryptographic protection of information is one of the urgent issues of ensuring information security.
References
Брюс Шнайер «Прикладная криптография. Протокол, алгоритм», Исходные тексты на языке С.И. – М.: ТРИУМФ, 2002.
Filatova, S. Chernishova "Authentication in computer systems", 2005.
Смарт Н., "Криптография", М. - Техносфера, 2005. 528 с.
T. El Gamal, A Public-key Cryptosystem and a Signature Based on Discrete Logarithms. IEEE Trans. Inform. Theory, Vol. IT-31,pp.469-472, July 1985.
Miller V. Use of elliptic curves in cryptography // Advances in cryptology — CRYPTO’85 (Santa Barbara, Calif., 1985). 1986. (Lecture Notes in Comput. Sci.; V. 218).
P.F.Xasanov, X.P.Xasanov, O.P.Axmedova, A.B.Davlatov «Kriptotahlil va uning maxsus usullari» – Toshkent, 2010 – 175 bet.
X.P.Xasanov Takomillashgan diamatrisalar algebralari va parametrli algebra asosida kriptotizimlar yaratish usullari va algoritmlari. Toshkent, FTMTM, 2008.