Ikki tomonlama qisman gomomorfik shifrlash usuli
Xususiy biometriya uchun ikki tomonlama qisman gomomorfik
shifrlash
usuli bugungi xususiy biometrikaga o‘xshash edi, chunki u biometrik xususiyatlar
ma’lumotlarini gomomorfik shifrlash yordamida himoya qilishni
taklif qildi va
shifrlangan xususiyatlarning o‘xshashligini Hamming va Evklidan kabi
ko‘rsatkichlar bilan o‘lchadi. masofalar. Biroq, ishonchli
tomonlar tomonidan
boshqarilishi kerak bo‘lgan maxfiy kalitlarning mavjudligi sababli usul
ma’lumotlar yo‘qotilishiga zaif edi. Yondashuvning keng qo‘llanilishi,
shuningdek, shifrlash sxemalarining murakkab kalitlarini
boshqarish va katta
hisoblash va ma’lumotlarni saqlash talablaridan aziyat chekdi.
22
X U L O S A
Bu loyiha ishim davomida men ko‘plab bilim va malakaga ega bo‘ldim. Ularni
amalda o‘zim sinab ko‘rdim. Loyiha ishimni bajarish mobaynida biometric
shifrlash algorimlarining hayotda va Axborot xavfsizligi
sohasida juda katta
o‘ringa ega ekanligiga amin bo‘ldim. Biometric shifrlash algoritmlari o‘zining tez,
sodda, foydalaniluvchanligi va yuqori darajadagi ishonchliligi jihatidan ancha
qulay hisoblanadi. Masalan, hozirgi zamonda deyarli barcha insonlarda hech
bo‘lmaganda bitta biometric shifrlash algoritmidan foydalaniladigan
qurilmasi bor
– bu oddiy smartfon. So‘nggi ishlab chiqarilayotgan smartfonlarning deyarli
barchasida barmoq izi skaneri va yuzdan tanib olish sistemasi ya’ni, “Face ID”
mavjud.
Xulosa qilib aytadigan bo ‘lsam, bu loyiha ishidan
meni tushuncham insonlar
hayotida biometric shifrlash algoritmlari hozirgi zamon uchun katta ahamiyat kasb
etmoqda va bundan keyin ham juda muhim rol o‘ynaydi.
23
FOYDALANILGAN ADABIYOTLAR RO‘YXATI
1.
Jump up to: a b c Biometrics Open Protocol (BOPS) III. IEEE 2410-2018,
IEEE Standards Association. 2018. Accessed 7/22/2018.
2.
Selleck, Evan. “Craig Federighi Says Apple is ‘Focusing
Face ID on Single
User Authentication.’” Phone Hacks. 12-01-2017. Accessed 7-15-2018.
3.
Jump up to:a b Florian Schroff, Dmitry Kalenichenko, James Philbin.
“FaceNet: A unified embedding for face recognition and clustering.” CVPR 2015:
815-823
4.
Jump up to:a b c Private.id
5.
Unpublished 2018 white paper, Private Identity, LLC.
6.
Evans, Johnny. “iPhone X & Face ID: Everything you need to know.”
ComputerWorld. 9/13/2017. Accessed 7/22/2018
7.
Ben Shneiderman. 1973. Polynomial search. Softw. Pract. Exper. 3, 1
(January 1973), 5-8.
8.
Karn, Ujjwal. “An Intuitive Explanation of Convolutional Neural Networks.”
The Data Science Blog. 8/11/2016, Accessed 7/22/2018.
9.
Lian, Shiguo, Jinsheng Sun, and Zhiquan Wang. “One-way hash function
based on neural network”.
10.
“One-Way Encryption.”