|
Ikki tomonlama qisman gomomorfik shifrlash usuli
|
bet | 11/20 | Sana | 20.12.2023 | Hajmi | 418,9 Kb. | | #124487 |
Ikki tomonlama qisman gomomorfik shifrlash usuli
Xususiy biometriya uchun ikki tomonlama qisman gomomorfik shifrlash
usuli bugungi xususiy biometrikaga o‘xshash edi, chunki u biometrik xususiyatlar ma’lumotlarini gomomorfik shifrlash yordamida himoya qilishni taklif qildi va shifrlangan xususiyatlarning o‘xshashligini Hamming va Evklidan kabi ko‘rsatkichlar bilan o‘lchadi. masofalar. Biroq, ishonchli tomonlar tomonidan boshqarilishi kerak bo‘lgan maxfiy kalitlarning mavjudligi sababli usul ma’lumotlar yo‘qotilishiga zaif edi. Yondashuvning keng qo‘llanilishi, shuningdek, shifrlash sxemalarining murakkab kalitlarini boshqarish va katta hisoblash va ma’lumotlarni saqlash talablaridan aziyat chekdi.
21
XULOSA
Bu loyiha ishim davomida men ko‘plab bilim va malakaga ega bo‘ldim. Ularni
amalda o‘zim sinab ko‘rdim. Loyiha ishimni bajarish mobaynida biometric shifrlash algorimlarining hayotda va Axborot xavfsizligi sohasida juda katta o‘ringa ega ekanligiga amin bo‘ldim. Biometric shifrlash algoritmlari o‘zining tez, sodda, foydalaniluvchanligi va yuqori darajadagi ishonchliligi jihatidan ancha qulay hisoblanadi. Masalan, hozirgi zamonda deyarli barcha insonlarda hech bo‘lmaganda bitta biometric shifrlash algoritmidan foydalaniladigan qurilmasi bor – bu oddiy smartfon. So‘nggi ishlab chiqarilayotgan smartfonlarning deyarli barchasida barmoq izi skaneri va yuzdan tanib olish sistemasi ya’ni, “Face ID” mavjud.
Xulosa qilib aytadigan bo ‘lsam, bu loyiha ishidan meni tushuncham insonlar hayotida biometric shifrlash algoritmlari hozirgi zamon uchun katta ahamiyat kasb etmoqda va bundan keyin ham juda muhim rol o‘ynaydi.
22
FOYDALANILGAN ADABIYOTLAR RO‘YXATI
1. Jump up to: a b c Biometrics Open Protocol (BOPS) III. IEEE 2410-2018,
IEEE Standards Association. 2018. Accessed 7/22/2018.
2. Selleck, Evan. “Craig Federighi Says Apple is ‘Focusing Face ID on Single User Authentication.’” Phone Hacks. 12-01-2017. Accessed 7-15-2018.
3. Jump up to:a b Florian Schroff, Dmitry Kalenichenko, James Philbin. “FaceNet: A unified embedding for face recognition and clustering.” CVPR 2015: 815-823
4. Jump up to:a b c Private.id
5. Unpublished 2018 white paper, Private Identity, LLC.
6. Evans, Johnny. “iPhone X & Face ID: Everything you need to know.” ComputerWorld. 9/13/2017. Accessed 7/22/2018
7. Ben Shneiderman. 1973. Polynomial search. Softw. Pract. Exper. 3, 1 (January 1973), 5-8.
8. Karn, Ujjwal. “An Intuitive Explanation of Convolutional Neural Networks.” The Data Science Blog. 8/11/2016, Accessed 7/22/2018.
9. Lian, Shiguo, Jinsheng Sun, and Zhiquan Wang. “One-way hash function based on neural network”.
10.“One-Way Encryption.”
23
MUHAMMAD AL-XORAZMIY NOMIDAGI TOSHKENT AXBOROT TEXNOLOGIYALARI UNIVERSITETI
“AXBOROT XAVFSIZLIGINI TA’MINLASH” kafedrasi talabalari uchun
|
| |