Abstract
Maqolada moliyaviy axborot tizimlarida simmetrik kriptografik algoritmlar, xususan AES va ChaCha20-Poly1305, samaradorligi va ularning turli platformalardagi ishlash ko‘rsatkichlari tahlil qilinadi. Shuningdek, kalit generatsiyasi, psevdo-tasodifiy sonlar generatorlari va kalitlarni boshqarish masalalari ko‘rib chiqilgan. Tadqiqot natijalari AES algoritmining apparat tezlashtirishda yuqori samaradorligini, ChaCha20-Poly1305 esa resurs cheklangan muhitlarda ustunligini ko‘rsatadi. Kalit sifatining barqarorligi va yetarli entropiya darajasi tizim xavfsizligining asosiy omillari sifatida ta’kidlangan.
References
[1] National Institute of Standards and Technology. (2001). FIPS 197: Advanced Encryption Standard (AES). https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197.pdf
[2] Czempas, P. (2026, January 23). The challenging path to adopting the ISO Format 4 PIN block. Utimaco. https://utimaco.com/news/blog-posts/challenging-path-adopting-iso-format-4-pin-block
[3] Nir, Y., & Langley, A. (2018). ChaCha20 and Poly1305 for IETF protocols (RFC 8439). Internet Engineering Task Force. https://doi.org/10.17487/RFC8439
[4] National Institute of Standards and Technology. (2020). Recommendation for key management: Part 1 – General (NIST Special Publication 800-57 Part 1 Rev. 5). U.S. Department of Commerce. https://doi.org/10.6028/NIST.SP.800-57pt1r5
[5] European Payments Council. (2025). Guidelines on cryptographic algorithms usage and key management (Version 15.0, EPC342-08). https://www.epc-cep.eu
[6] Saydahd, S. J., Muhammed, R. K., Hassan, S. A., & Aladdin, A. M. (2024). A comparative performance evaluation of hybrid encryption techniques using ECC, RSA, AES, and ChaCha20 for secure data transmission. International Journal of Operations Research and Information Systems, 12(2). https://doi.org/10.53523/ijoirVol12I2ID598
[7] Nikzad, M., & Atas, K. (2025). When RSA fails: Exploiting prime selection vulnerabilities in public key cryptography. arXiv. https://doi.org/10.48550/arXiv.2512.22720
[8] PCI Security Standards Council. (2014). PIN Security Requirements, Version 2.0.
[9] Singh, A., Marwaha, M., Singh, B., & Singh, S. (2013). Comparative study of DES, 3DES, AES and RSA. International Journal of Computers & Technology, 9(3), 1162–1170.
[10] Ganesh, R., Khan, B. U. I., Khan, A. R., & Kamsin, A. B. (2025). A panoramic survey of the advanced encryption standard: From architecture to security analysis, key management, real-world applications, and post-quantum challenges. International Journal of Information Security, 24, 216. https://doi.org/10.1007/s10207-025-01116-x
[11] Heninger, N., Durumeric, Z., Wustrow, E., & Halderman, J. A. (2012). Mining your Ps and Qs: Detection of widespread weak keys in network devices. In Proceedings of the 21st USENIX Security Symposium (pp. 205–220). USENIX Association.
[12] PCI Security Standards Council. (2022). PCI DSS v4.0: Payment Card Industry Data Security Standard.
[13] Paar, C., & Pelzl, J. (2010). Understanding Cryptography: A Textbook for Students and Practitioners. Springer-Verlag Berlin Heidelberg.
[14] Boneh, D., & Shoup, V. (2023). A Graduate Course in Applied Cryptography (Version 0.6, p. 121). Stanford University.
[15] Rescorla, E. (2018). The Transport Layer Security (TLS) Protocol Version 1.3 (RFC 8446). Internet Engineering Task Force. https://doi.org/10.17487/RFC8446
[16] Bernstein, D. J. (2008). ChaCha, a variant of Salsa20. Workshop Record of SASC 2008. http://cr.yp.to/chacha/chacha-20080120.pdf
[17] GitHub Security Lab. (2021). GHSL-2021-1012: Poor random number generation in keypair (CVE-2021-41117). https://securitylab.github.com/advisories/GHSL-2021-1012-keypair/
[18] Deepak Shanker. (2017, October 17). ROCA: Vulnerable RSA key generation (CVE-2017-15361). Qualys. https://threatprotect.qualys.com/2017/10/17/roca-vulnerable-rsa-key-generation-cve-2017-15361/
[19] CVEDetails. (n.d.). CVE-2008-0166: OpenSSL on Debian predictable random number generator weakens cryptographic key security. https://www.cvedetails.com/cve/CVE-2008-0166/
[20] Aqtive Guard. (n.d.). Weak cryptography keys. https://docs.aqtiveguard.com/kb-articles/weak-cryptography-keys/
[21] Barker, E., & Kelsey, J. (2015). Recommendation for random number generation using deterministic random bit generators (NIST SP 800-90A Rev. 1). National Institute of Standards and Technology. https://doi.org/10.6028/NIST.SP.800-90Ar1
[22] Turan, M. S., Barker, E., Kelsey, J., & McKay, K. (2018). Recommendation for the entropy sources used for random bit generation (NIST SP 800-90B). National Institute of Standards and Technology. https://doi.org/10.6028/NIST.SP.800-90B