
CRYPTOGRAPHY AND COMMUNICATION SECURITY IN THE DIGITAL AGE
E.I.Saidaxmedov , Denov Institute of Entrepreneurship and Pedagogyi Z.O.Nurmatov , Denov is a teacher at the Institute of Entrepreneurship and Pedagogyi G.T.Doniyorova , Denov is a teacher at the Institute of Entrepreneurship and PedagogyAbstract
Have you ever forgotten your password on a website you signed up for months ago? This password recovery process begins with a trial and error process of familiar passwords and is usually followed by a "Forgot Password?" ends by pressing the button. button nearby. When you refresh your inbox in search of an email the website sent you, the instructions to log in to your account will finally arrive. Here's a red flag: this email contains your old password in plain text. If you do, you should question the security of this website and consider deleting your account.
Keywords
cryptographic, symmetric key cryptography, public key cryptography, encryption, quantum computers, quantum cryptography.
References
]BM Metzger and MD Coogan, The Oxford Companion to the Bible. Oxford[et al]: Oxford University Press, 2004
S. Vodenay, A Classic Introduction to Cryptography: Applications to Communication Security.New York: Springer-Verlag New York, 2005
P. Thorsteinson and GAG Ganesh, .NET Security and Cryptography. United States: Prentice Hall PTR, 2003.
H. Delfs and H. Knebl, Introduction to Cryptography: Principles and Applications, 3rd ed. 2015.
K. Krishnan, "SFWR 4C03: Computer Networks and Computer Security", North Carolina State University, 2004.
“Public Key Encryption”, www.tutorialspoint.com, 2016. [Online].Available at: http://www.tutorialspoint.com/cryptography/public_key_encryption.htm. Entered: September 7, 2016.
T. Dierks, "Transport Layer Security (TLS) Protocol Version 1.2", 2008. [Online]. Available at: https://tools.ietf.org/html/rfc5246. Entered: September 8, 2016.
H.-K. Lo, M. Curty, and K. Tamaki, "Secure quantum key distribution," Nature Photonics, vol. 8, no. 8, pp. 595–604, July 2014.
Islomovich, S. E. (2023, March). MAVZU: ELEKTRON RAQAMLI IMZO VA BULUT TEXNOLOGIYALARI: FOYDALANISH MASALALARI TAHLILI. In Proceedings of Scientific Conference on Multidisciplinary Studies (Vol. 2, No. 3, pp. 31-34).
Saidahmedov, E. (2023). KVANT ALGORITMLARNI ISHLAB CHIQISHDA KVANT KOMPYUTERLARINING O ‘RNI. Наука и инновация, 1(1), 58-64.
Islomovich, S. E. (2023, May). THE ROLE OF QUANTUM COMPUTERS IN THE DEVELOPMENT OF QUANTUM ALGORITHMS. In INTERNATIONAL SCIENTIFIC CONFERENCES WITH HIGHER EDUCATIONAL INSTITUTIONS (Vol. 1, No. 05.05, pp. 557-563).
Nurmatov, Z. O., Tursunpulatova, K. A., & Nasriddinova, Z. N. (2023, May). THE ROLE OF MULTIMEDIA TECHNOLOGIES IN TEACHING FOREIGN LANGUAGES. In International Conference on Science, Engineering & Technology (Vol. 1, No. 1, pp. 99-103).
Якубов, С. Х., Хамраев, А. А., Хушбоков, И. У., & Нурматов, З. О. (2022). АЛГОРИТМИЗАЦИЯ САПР ОПТИМИЗАЦИИ ТОНКОСТЕННЫХ ЭЛЕМЕНТОВ ИНЖЕНЕРНЫХ КОНСТРУКЦИЙ. Universum: технические науки, (11-1 (104)), 53-59.
Shamsiddinovich, M. R., & Obidjonovich, Z. N. (2021). Advantages and Improvements of E-Textbook Teaching of Computer Science in General Secondary Educatin. CENTRAL ASIAN JOURNAL OF MATHEMATICAL THEORY AND COMPUTER SCIENCES, 2(12), 71-74.
Nurmatov, ZO, Chorshamiyeva, ON, & Pirimova, F.A. (2023). KIBERXAVFSIZLIKNI TASHKIL ETISHDA AXBOROT TEXNOLOGIYALARINING ROLI. TA'LIM VA RIVOJLANISH TAHLILI ONLAYN ILMIY JURNALI , 3 (5), 432-442.
Article Statistics
Downloads
Copyright License

This work is licensed under a Creative Commons Attribution 4.0 International License.