KLASSIK SHIFRLASH ALGORITMLARINING XUSUSIYATLARINI NEYRON TARMOQ ORQALI O‘RGANISH
DOI:
https://doi.org/10.5281/zenodo.19555621Keywords:
klassik shifrlash algoritmlari; kriptografiya; kriptotahlil; sun’iy neyron tarmoqlari; mashinali o‘rganish; chuqur o‘rganish; shifrmatn; statistik xususiyatlar; monoalfavitli shifrlash; polialfavitli shifrlash; algoritmlarni tasniflash; axborot xavfsizligi; intellektual tahlil.Abstract
Mazkur tadqiqot ishida klassik shifrlash algoritmlarining asosiy xususiyatlarini sun’iy neyron tarmoqlar
yordamida o‘rganish va tahlil qilish masalalari ko‘rib chiqilgan. Tadqiqot jarayonida monoalfavitli va polialfavitli shifrlash
algoritmlariga xos bo‘lgan statistik, strukturaviy hamda lingvistik belgilar ajratib olinadi va ular asosida neyron tarmoq
modeli shakllantiriladi. Shifrmatnlar to‘plami asosida o‘qitilgan model orqali turli klassik shifrlash algoritmlarining farqlovchi
xususiyatlarini aniqlash imkoniyati baholanadi. Ish doirasida sun’iy neyron tarmoqlarning kriptografik ma’lumotlar bilan
ishlashdagi samaradorligi va aniqlik darajasi klassik kriptotahlil usullari bilan taqqoslanadi. Olingan natijalar klassik
shifrlash algoritmlarini avtomatik aniqlash, tasniflash hamda kriptotahlil jarayonlarini intellektuallashtirishda neyron
tarmoqlardan foydalanish imkoniyatlarini kengaytiradi.
References
Oʻzbekiston Respublikasining 15-aprel 22-yildagi “Kiberxavfsizlik to‘g‘risida”gi O‘RQ-764-sonli Qonuni https://lex.uz/
docs/-5960604.
Claude E. Shannon Communication theory of secrecy systems // Bell System Technical Journal. — 1949. — Vol. 28,
No. 4. — P. 656-715.
Bruce Schneier Applied cryptography: protocols, algorithms, and source code in C. — New York: John Wiley & Sons,
— P. 1-45, 87-102.
William Stallings Cryptography and network security: principles and practice. — 7th ed. — London: Pearson Education,
— P. 20-110.
David Kahn The codebreakers: the comprehensive history of secret communication. — New York: Scribner, 1996. —
P. 75-140.
A. Diro, N. Chilamkurti Deep learning for secure communication // IEEE Access. — 2018. — P. 45892-45903.
R. Karimov, A. Xudoyberdiyev Axborot xavfsizligini ta’minlashning kriptografik usullari. — Toshkent: Fan va texnologiya,
— 12-34-betlar.
Ian Goodfellow, Yoshua Bengio, Aaron Courville Deep Learning. — Cambridge, MA: MIT Press, 2016. — P. 17-85.
Simon Haykin Neural networks and learning machines. — 3rd ed. — New Jersey: Pearson, 2009. — P. 1-55.
Ian Goodfellow, Yoshua Bengio, Aaron Courville Deep learning. — Cambridge, MA: MIT Press, 2016. — P. 17-85.
A. Diro, N. Chilamkurti Deep learning for secure communication // IEEE Access. — 2018. — P. 45892-45903.
Downloads
Published
Issue
Section
License
Copyright (c) 2026 MUHANDISLIK VA IQTISODIYOT

This work is licensed under a Creative Commons Attribution 4.0 International License.