HYBRID CRYPTOGRAPHIC ALGORITHM FOR SECURE DATA ENCRYPTION IN CLOUD COMPUTING SYSTEMS

Authors

  • O‘tkirbek Jurayev

DOI:

https://doi.org/10.47390/ts-v4i3y2026N11

Keywords:

Cloud computing, distributed computing systems, cryptography, modern cryptosystems, symmetric encryption algorithms, asymmetric encryption algorithms, AES - 256, RSA - 2048, hybrid cryptographic model, key management mechanisms, data confidentiality, data integrity, information security, cloud storage security, key exchange protocols, NIST standards, block cipher, public-key cryptosystem, authentication, digital signature, cybersecurity [7].

Abstract

Mazkur maqolada bulutli hisoblash tizimlarida ma’lumotlar xavfsizligini ta’minlash maqsadida gibrid kriptografik algoritm ishlab chiqish va uning samaradorligini baholash masalasi ko‘rib chiqilgan.Tadqiqot davomida AES - 256 simmetrik shifrlash algoritmi hamda RSA - 2048 ochiq kalitli algoritmi kombinatsiyasi asosida yangi model taklif etildi [3].Tajriba natijalari algoritmning yuqori tezkorlik va xavfsizlik darajasini ta’minlashini ko‘rsatdi [10].

References

1. Stallings, W. Cryptography and Network Security: Principles and Practice. - 7th ed., Pearson, 2020.

2. 2.Paar, C., Pelzl, J. Understanding Cryptography: A Textbook for Students and Practitioners. – Springer, 2019.

3. 3.National Institute of Standards and Technology (NIST). FIPS PUB 197: Advanced Encryption Standard (AES). - Gaithersburg, MD, 2001.

4. 4.Ron Rivest, Adi Shamir, Leonard Adleman. “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems.” Communications of the ACM, 21(2), 1978, pp. 120 - 126.

5. 5.IEEE. IEEE Transactions on Cloud Computing. – Vol. 11, No. 2, 2023.

6. 6.National Institute of Standards and Technology (NIST). SP 800-57 Part 1 Rev. 5: Recommendation for Key Management. – 2020.

7. 7.National Institute of Standards and Technology (NIST). SP 800-175B: Guideline for Using Cryptographic Standards in the Federal Government. – 2020.

8. 8.William Diffie, Martin Hellman. “New Directions in Cryptography.” IEEE Transactions on Information Theory, 22(6), 1976, pp. 644–654.

9. 9.Victor Miller. “Use of Elliptic Curves in Cryptography.” Advances in Cryptology - CRYPTO ’85, Springer, 1986.

10. 10.Aljawarneh, S., et al. “Hybrid Encryption Schemes for Secure Cloud Data Storage.” Journal of Cloud Computing, 2022, Vol. 11, Article 45

Downloads

Submitted

2026-03-25

Published

2026-03-25

How to Cite

Jurayev , O. (2026). HYBRID CRYPTOGRAPHIC ALGORITHM FOR SECURE DATA ENCRYPTION IN CLOUD COMPUTING SYSTEMS. Techscience Uz - Topical Issues of Technical Sciences, 4(3), 83–91. https://doi.org/10.47390/ts-v4i3y2026N11

Similar Articles

<< < 6 7 8 9 10 11 12 > >> 

You may also start an advanced similarity search for this article.