The Role of NSA Algorithm Reflection Selection in Meeting Security Requirements
dc.creator | Xudoyqulov, Z.T. | |
dc.creator | Rahmatullayev, I.R. | |
dc.creator | Umurzoqov, O.SH. | |
dc.date | 2023-12-26 | |
dc.date.accessioned | 2024-03-25T11:46:39Z | |
dc.date.available | 2024-03-25T11:46:39Z | |
dc.description | In order to study the impact of the proposed NSA(New stream algorithm) algorithm reflections on the selection of security parameters, research was carried out, in which analysis methods and data presented in the literature were used. The output function of the NSA algorithm provides the 64-bit as the output value after the t-round. This requires investigating how small changes in input affect the NSA output function. Choosing any other array as the output array is easy to crack. | en-US |
dc.description | Mazkur maqolada taklif etilgan NSA(New stream algoritm) algoritmi akslantirishlarining tanlanishida xavfsizlik parametrlariga ta’sirini o‘rganish maqsadida tadqiqotlar o‘tkazildi, bunda adabiyotlarda keltirilgan tahlil usullari va ma’lumotlardan foydalanildi. NSA agoritmining chiqish funktsiyasi 64 bitli a2(t) ni t - raunddan so‘ng chiqish qiymati sifatida taqdim qiladi. Bunda NSA chiqish funksiyasiga kirishdagi kichik o‘zgarishlar qanday ta’sir etishini tekshirish talab etiladi. Chiqish massivi sifatida boshqa har qanday massiv tanlanganda shifrni osongina buzish mumkin bo‘ladi. | ru-RU |
dc.format | application/pdf | |
dc.identifier | https://ijdt.uz/index.php/ijdt/article/view/141 | |
dc.identifier | 10.62132/ijdt.v6i4.141 | |
dc.identifier.uri | https://dspace.umsida.ac.id/handle/123456789/36096 | |
dc.language | rus | |
dc.publisher | Samarkand branch of TUIT | ru-RU |
dc.relation | https://ijdt.uz/index.php/ijdt/article/view/141/96 | |
dc.rights | Copyright (c) 2023 Рахматуллаев И.Р. | ru-RU |
dc.rights | https://creativecommons.org/licenses/by/4.0 | ru-RU |
dc.source | INTERNATIONAL JOURNAL OF THEORETICAL AND APPLIED ISSUES OF DIGITAL TECHNOLOGIES; Vol. 6 No. 4 (2023): International Journal of Theoretical and Applied Issues of Digital Technologies; 97-101 | en-US |
dc.source | Международный Журнал Теоретических и Прикладных Вопросов Цифровых Технологий; Том 6 № 4 (2023): Международный журнал теоретических и прикладных вопросов цифровых технологий; 97-101 | ru-RU |
dc.source | 2181-3094 | |
dc.source | 2181-3086 | |
dc.subject | NSA | en-US |
dc.subject | function | en-US |
dc.subject | Array | en-US |
dc.subject | analysis | en-US |
dc.subject | MDS matrix | en-US |
dc.subject | S-box | en-US |
dc.subject | non-linear | en-US |
dc.subject | NSA | ru-RU |
dc.subject | funksiya | ru-RU |
dc.subject | Massiv | ru-RU |
dc.subject | tahlil | ru-RU |
dc.subject | MDS matritsa | ru-RU |
dc.subject | S-box | ru-RU |
dc.subject | chiziqsiz | ru-RU |
dc.title | The Role of NSA Algorithm Reflection Selection in Meeting Security Requirements | en-US |
dc.title | NSA algoritmining akslantirishlari tanlanishining xavfsizlik talablarini bajarilishidagi o‘rni | ru-RU |
dc.type | info:eu-repo/semantics/article | |
dc.type | info:eu-repo/semantics/publishedVersion | |
dc.type | Рецензированная статья | ru-RU |