Education of the republic of uzbekistan tashkent state technical university named after islam karimov



Download 17,18 Mb.
Pdf ko'rish
bet146/276
Sana22.07.2022
Hajmi17,18 Mb.
#840106
1   ...   142   143   144   145   146   147   148   149   ...   276
Bog'liq
Сборник журналя Техника Инновэйшн

UDC 004.05 6.53 
 
ANALYSIS OF METHODS AND ALGORITHMS OF ENCRYPTION ON THE BASIS 
OF LOCAL STANDARDS 
 
N.N. Ochilov
 
Tashkent University of Information Technologies named after Muhammad al-Khwarizmi 
108 Amir Temur Avenue 100200, Tashkent, Uzbekistan 
 
Abstract.
 The article discusses the priorities of the international community to ensure 
information security. Cooperation between states in this area is still developing, and in the 
Republic of Uzbekistan, special attention is paid to the protection of state secrets and 
confidential information. In the Republic of Uzbekistan, there is a encryption/decryption 
algorithm based on the O'zDSt 1105:2009 standard, which describes a block cipher algorithm. 
This article presents the theoretical results obtained on the basis of the O'zDSt 1105:2009 
standard. In the cryptographic standard O'zDSt 1105:2009, the exchange of a table consists of 


Electrical and Computer Engineering
153 
replacing 256 values, and according to a given formula, a bit is formed on the arguments d, L, 
R, depending on the extended key k
se
[2]. During the analysis, the initialization time of the 
system in encryption modes was also studied. In most cases, the initial time deviations of the 
encryption depending on the selected mode are not significant. In CBC and CFB modes, the 
initialization time increases. 
 
Keywords: 
encryption, decryption, standard, parallel computing, linear, differential, 
round, key length. 
INTRODUCTION. 
The operation of cryptographic functions is performed in the 
process of functions that determine the minimum latency of responses to queries. The amount 
of RAM required to perform such actions must be reserved in advance by the system 
administrator. Because the computer has a limited amount of RAM, libraries cannot be used 
anywhere. 
Modern operating systems use cryptographic methods of information protection 
everywhere. A special module is created to unify cryptographic functions into operating 
systems. This module includes various cryptographic functions. 

Download 17,18 Mb.

Do'stlaringiz bilan baham:
1   ...   142   143   144   145   146   147   148   149   ...   276




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish