The notions of norm and distance in BCI-algebras are introduced, and some basic properties in normed BCI-algebras are given. It is obtained that the isomorphic(homomorphic) image and inverse image of a normed BCI-alge...The notions of norm and distance in BCI-algebras are introduced, and some basic properties in normed BCI-algebras are given. It is obtained that the isomorphic(homomorphic) image and inverse image of a normed BCI-algebra are still normed BCI-algebras. The relations of normaled properties between BCI-algebra and Cartesian product of BCIalgebras are investigated. The limit notion of sequence of points in normed BCI-algebras is introduced, and its related properties are investigated.展开更多
SKINNY-64-64 is a lightweight block cipher with a 64-bit block length and key length,and it is mainly used on the Internet of Things(IoT).Currently,faults can be injected into cryptographic devices by attackers in a v...SKINNY-64-64 is a lightweight block cipher with a 64-bit block length and key length,and it is mainly used on the Internet of Things(IoT).Currently,faults can be injected into cryptographic devices by attackers in a variety of ways,but it is still difficult to achieve a precisely located fault attacks at a low cost,whereas a Hardware Trojan(HT)can realize this.Temperature,as a physical quantity incidental to the operation of a cryptographic device,is easily overlooked.In this paper,a temperature-triggered HT(THT)is designed,which,when activated,causes a specific bit of the intermediate state of the SKINNY-64-64 to be flipped.Further,in this paper,a THT-based algebraic fault analysis(THT-AFA)method is proposed.To demonstrate the effectiveness of the method,experiments on algebraic fault analysis(AFA)and THT-AFA have been carried out on SKINNY-64-64.In the THT-AFA for SKINNY-64-64,it is only required to activate the THT 3 times to obtain the master key with a 100%success rate,and the average time for the attack is 64.57 s.However,when performing AFA on this cipher,we provide a relation-ship between the number of different faults and the residual entropy of the key.In comparison,our proposed THT-AFA method has better performance in terms of attack efficiency.To the best of our knowledge,this is the first HT attack on SKINNY-64-64.展开更多
This paper aims to introduce new notions of (fuzzy) n-fold P-ideals and (fuzzy) n-fold weak P-ideals in BCI-algebras, and investigate several properties of the foldness theory of P-ideals in BCI-algebras. Finally, we ...This paper aims to introduce new notions of (fuzzy) n-fold P-ideals and (fuzzy) n-fold weak P-ideals in BCI-algebras, and investigate several properties of the foldness theory of P-ideals in BCI-algebras. Finally, we construct a computer-program for studying the foldness theory of P-ideals in BCI-algebras.展开更多
Some properties about stable subset S(θ n) and image Im(θ n) of self homomorphism \{θ n:x→0*x n\} are discussed. The characterization that Im(θ n) becomes an ideal of BCI algebra X is given.
基金Supported by the Special Item of Key Laboratory of Education Bureau of Sichuan Province(2006ZD050)Supported by Natural Science Foundation of China(11071178)
文摘The notions of norm and distance in BCI-algebras are introduced, and some basic properties in normed BCI-algebras are given. It is obtained that the isomorphic(homomorphic) image and inverse image of a normed BCI-algebra are still normed BCI-algebras. The relations of normaled properties between BCI-algebra and Cartesian product of BCIalgebras are investigated. The limit notion of sequence of points in normed BCI-algebras is introduced, and its related properties are investigated.
基金supported in part by the Natural Science Foundation of Heilongjiang Province of China(Grant No.LH2022F053)in part by the Scientific and technological development project of the central government guiding local(Grant No.SBZY2021E076)+2 种基金in part by the PostdoctoralResearch Fund Project of Heilongjiang Province of China(Grant No.LBH-Q21195)in part by the Fundamental Research Funds of Heilongjiang Provincial Universities of China(Grant No.145209146)in part by the National Natural Science Foundation of China(NSFC)(Grant No.61501275).
文摘SKINNY-64-64 is a lightweight block cipher with a 64-bit block length and key length,and it is mainly used on the Internet of Things(IoT).Currently,faults can be injected into cryptographic devices by attackers in a variety of ways,but it is still difficult to achieve a precisely located fault attacks at a low cost,whereas a Hardware Trojan(HT)can realize this.Temperature,as a physical quantity incidental to the operation of a cryptographic device,is easily overlooked.In this paper,a temperature-triggered HT(THT)is designed,which,when activated,causes a specific bit of the intermediate state of the SKINNY-64-64 to be flipped.Further,in this paper,a THT-based algebraic fault analysis(THT-AFA)method is proposed.To demonstrate the effectiveness of the method,experiments on algebraic fault analysis(AFA)and THT-AFA have been carried out on SKINNY-64-64.In the THT-AFA for SKINNY-64-64,it is only required to activate the THT 3 times to obtain the master key with a 100%success rate,and the average time for the attack is 64.57 s.However,when performing AFA on this cipher,we provide a relation-ship between the number of different faults and the residual entropy of the key.In comparison,our proposed THT-AFA method has better performance in terms of attack efficiency.To the best of our knowledge,this is the first HT attack on SKINNY-64-64.
文摘This paper aims to introduce new notions of (fuzzy) n-fold P-ideals and (fuzzy) n-fold weak P-ideals in BCI-algebras, and investigate several properties of the foldness theory of P-ideals in BCI-algebras. Finally, we construct a computer-program for studying the foldness theory of P-ideals in BCI-algebras.
文摘Some properties about stable subset S(θ n) and image Im(θ n) of self homomorphism \{θ n:x→0*x n\} are discussed. The characterization that Im(θ n) becomes an ideal of BCI algebra X is given.