“SAVOL-JAVOB” MEXANIZMIGA ASOSLANGAN HMAC ALGORITMI YORDAMIDA FOYDALANUVCHILARNI AUTENTIFIKATSIYALASH USULI
Keywords:
identifikatsiya, autentifikatsiya, parol, maxfiylik, konfidensiallik, xavfsizlik, PFS, PKI, HMAC, raqamli imzo, kriptografiya, shifrlash, kalitlarni boshqarish.Abstract
Ushbu maqolada “Savol-javob” mexanizmiga asoslangan autentifikatsiya usullarining tahlili o‘rganib chiqildi. “Savol-javob” asosidagi autentifikatsiya usuli keng qo‘llanilsa-da, so‘nggi paytlarda uni amalga oshirish va samaradorligiga qaratilgan keng qamrovli tadqiqotlar etishmasligini keltirish mumkin. Shunga ko‘ra, takomillashtirilgan autentifikatsiya usuli, “Savol-javob” asosidagi autentifikatsiyani amalga oshirish va samaradorligi bilan bog‘liq bo‘lgan tadqiqotlar hamda ushbu mexanizmni amalga oshirishda foydalaniladigan kriptografik usullar va xavfsizlik protokollari tahlil etilgan. Shuningdek, “Savol-javob” mexanizmiga asoslangan HMAC algoritmi yordamida foydalanuvchilarni autentifikatsiyalash usuli taklif etilgan.
References
Conklin A., Dietrich G., Walz D. Password-based authentication: a system perspective //37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the. – IEEE, 2004. – С. 10 pp.
Khan R. H., Miah J. Performance Evaluation of a new one-time password (OTP) scheme using stochastic petri net (SPN) //2022 IEEE World AI IoT Congress (AIIoT). – IEEE, 2022. – С. 407-412.
Sharma K., Shrivastava G. Public key infrastructure and trust of web based knowledge discovery //Int. J. Eng., Sci. Manage. – 2014. – Т. 4. – №. 1. – С. 56-60.
Kim S. et al. Dynamic key update strategy in physical-layer challenge-response authentication //2019 13th International Conference on Signal Processing and Communication Systems (ICSPCS). – IEEE, 2019. – С. 1-6.
Turapbayevich I. A., Karimovich G. S., Usmanov S. Algorithm of Generating One-Time Passwords for Two-Factor Authentication of Users //World Conference Intelligent System for Industrial Automation. – Cham : Springer Nature Switzerland, 2022. – С. 132-139.
Verlan A. F. et al. Methods of Formation of a Security Policy in Access Differentiation Processes //Proceedings of International Conference on Application of Information and Communication Technology and Statistics in Economy and Education (ICAICTSEE). – International Conference on Application of Information and Communication Technology and Statistics and Economy and Education (ICAICTSEE), 2014. – С. 204.
Naidu D. Two-factor authentication for effective information security //International Research Journal of Modernization in Engineering Technology and Science. – 2022. – Т. 4. – №. 6. – С. 4307-4312.
Shemshi V. et al. Verification of electronic identity in federated systems using multi-factor authentication //Journal of Applied Sciences-SUT (JAS-SUT). – 2022. – Т. 8.
Cremers C., Feltz M. Beyond eCK: Perfect forward secrecy under actor compromise and ephemeral-key reveal //Computer Security–ESORICS 2012: 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings 17. – Springer Berlin Heidelberg, 2012. – С. 734-751.
Avoine G., Canard S., Ferreira L. Symmetric-key authenticated key exchange (SAKE) with perfect forward secrecy //Topics in Cryptology–CT-RSA 2020: The Cryptographers’ Track at the RSA Conference 2020, San Francisco, CA, USA, February 24–28, 2020, Proceedings. – Springer International Publishing, 2020. – С. 199-224.
Cremers C., Feltz M. Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal //Designs, Codes and Cryptography. – 2015. – Т. 74. – №. 1. – С. 183-218.
Mandal S., Mohanty S. Multi-party key-exchange with perfect forward secrecy //2014 International Conference on Information Technology. – IEEE, 2014. – С. 362-367.
Xu S. et al. An improved mutual authentication protocol based on perfect forward secrecy for satellite communications //International Journal of Satellite Communications and Networking. – 2020. – Т. 38. – №. 1. – С. 62-73.