NewHSA oqimli shifrlash algoritmining xususiyatlari
Keywords:
oqimli shifrlar, apparat, dasturiy ta’minot, LFSR, dasturiy modullar, NLFSR, NIST testlari, XOR, AND, mantiqiy elementlarAbstract
This paper presents a new stream encryption algorithm NewHSA (New Hardware Stream Encryption Algorithm), which consists of a total of 4 shift registers, 3 ANDs, and 23 XOR logic elements. The number of logic elements required for the hardware implementation of the algorithm is 830. The randomness of the encrypted bit sequence generated using NewHSA, its resistance to cryptanalysis, and its performance indicators in hardware are analyzed
References
J. Daemen, “Cipher and hash function design strategies based on linear and differential cryptanalysis,” Doctoral Dissertation, March 1995, K. U. Leuven
Rahmatullayev I., Boyquziyev I., Omonov A. OQIMLI SHIFRLASH UCHUN DASTURIY YECHIMLAR //DIGITAL TRANSFORMATION AND ARTIFICIAL INTELLIGENCE. – 2024. – Т. 2. – №. 4. – С. 28-38.
Rahmatullayev I., Abduraximov B. CHACHA20 OQIMLI SHIFRLASH ALGORITMINING RAUND FUNKSIYASINING MODIFIKATSIYA VARIANTLARINI BAHOLASH //DIGITAL TRANSFORMATION AND ARTIFICIAL INTELLIGENCE. – 2024. – Т. 2. – №. 5. – С. 18-26.
Rahmatullayev I. SIMMETRIK UZLUKSIZ SHIFRLASH ALGORITMLARI KRIPTOBARDOSHLILIGINI BAHOLASH MEZONLARI //DIGITAL TRANSFORMATION AND ARTIFICIAL INTELLIGENCE. – 2024. – Т. 2. – №. 3. – С. 94-100.
Rahmatullayev I. R. OQIMLI SHIFRLASH ALGORITMLARINING XOSSALARI //«Ёш олимлар ахборотномаси»–«Вестник молодых ученых». – 2024. – Т. 4. – С. 46-49.
Turakulovich X. Z., Rahmatullayevich R. I. Mavjud oqimli shifrlash algoritmlarining qiyosiy tahlili //Al-Farg’oniy avlodlari. – 2024. – Т. 1. – №. 1. – С. 129-134.
Raxmatullayevich R. I. MAVJUD SINXRON OQIMLI SHIFRLASH ALGORITMLARINING QIYOSIY TAHLILI //Механика и технология. – 2024. – Т. 2. – №. 15. – С. 236-243.
A. Clark, J. Golic, W. Millan, L. Penna, L. Simpson, “The LILI-128 Keystream Generator,” NESSIE project submission, 2000, available at http://www.cryptonessie.org
S. Fluhrer, “Cryptanalysis of the SEAL 3.0 Pseudorandom Function Family,” Fast Software Encryption, FSE 2001, Proceedings, pp. 142–151, 2001.
T. Jacobsen and L. R. Knudsen, “The Interpolation Attackon BlockCiphers,” Fast Software Encryption, FSE’97, Springer-Verlag, LNCS 1267, pp. 28–40, 1997.
P. Rogaway, D. Coppersmith, “A Software-Optimized Encryption Algorithm,” Journal fo Cryptography, Vol. 11, No. 4, pp. 273–287, 1998.
Рахматуллаев И. Р. Oqimli shifrlash algoritmlari va ularni vujudga kelish sabablari. – 2024.
Additional Files
Published
How to Cite
Issue
Section
Categories
License
Copyright (c) 2025 Ilhom Rahmatullayev

This work is licensed under a Creative Commons Attribution 4.0 International License.