The notions of fuzzy dot ideals and fuzzy dot H-ideals in BCH-algebras are introduced, several appropriate examples are provided, and their some properties are investigated. The relations among fuzzy ideal, fuzzy H-id...The notions of fuzzy dot ideals and fuzzy dot H-ideals in BCH-algebras are introduced, several appropriate examples are provided, and their some properties are investigated. The relations among fuzzy ideal, fuzzy H-ideal, fuzzy dot ideal and fuzzy dot H-ideals in BCH- algebras are discussed, several equivalent depictions of fuzzy dot ideal are obtained. How to deal with the homomorphic image and inverse image of fuzzy dot ideals (fuzzy dot H-ideals) are studied. The relations between a fuzzy dot ideal (fuzzy dot H-ideal) in BCH-algebras and a fuzzy dot ideal (fuzzy dot H-ideal) in the product algebra of BCH-algebras are given.展开更多
SKINNY-64-64 is a lightweight block cipher with a 64-bit block length and key length,and it is mainly used on the Internet of Things(IoT).Currently,faults can be injected into cryptographic devices by attackers in a v...SKINNY-64-64 is a lightweight block cipher with a 64-bit block length and key length,and it is mainly used on the Internet of Things(IoT).Currently,faults can be injected into cryptographic devices by attackers in a variety of ways,but it is still difficult to achieve a precisely located fault attacks at a low cost,whereas a Hardware Trojan(HT)can realize this.Temperature,as a physical quantity incidental to the operation of a cryptographic device,is easily overlooked.In this paper,a temperature-triggered HT(THT)is designed,which,when activated,causes a specific bit of the intermediate state of the SKINNY-64-64 to be flipped.Further,in this paper,a THT-based algebraic fault analysis(THT-AFA)method is proposed.To demonstrate the effectiveness of the method,experiments on algebraic fault analysis(AFA)and THT-AFA have been carried out on SKINNY-64-64.In the THT-AFA for SKINNY-64-64,it is only required to activate the THT 3 times to obtain the master key with a 100%success rate,and the average time for the attack is 64.57 s.However,when performing AFA on this cipher,we provide a relation-ship between the number of different faults and the residual entropy of the key.In comparison,our proposed THT-AFA method has better performance in terms of attack efficiency.To the best of our knowledge,this is the first HT attack on SKINNY-64-64.展开更多
基金Supported by the special item of Key Laboratory of Education Bureau of Sichuan Province(2006ZD050)
文摘The notions of fuzzy dot ideals and fuzzy dot H-ideals in BCH-algebras are introduced, several appropriate examples are provided, and their some properties are investigated. The relations among fuzzy ideal, fuzzy H-ideal, fuzzy dot ideal and fuzzy dot H-ideals in BCH- algebras are discussed, several equivalent depictions of fuzzy dot ideal are obtained. How to deal with the homomorphic image and inverse image of fuzzy dot ideals (fuzzy dot H-ideals) are studied. The relations between a fuzzy dot ideal (fuzzy dot H-ideal) in BCH-algebras and a fuzzy dot ideal (fuzzy dot H-ideal) in the product algebra of BCH-algebras are given.
基金supported in part by the Natural Science Foundation of Heilongjiang Province of China(Grant No.LH2022F053)in part by the Scientific and technological development project of the central government guiding local(Grant No.SBZY2021E076)+2 种基金in part by the PostdoctoralResearch Fund Project of Heilongjiang Province of China(Grant No.LBH-Q21195)in part by the Fundamental Research Funds of Heilongjiang Provincial Universities of China(Grant No.145209146)in part by the National Natural Science Foundation of China(NSFC)(Grant No.61501275).
文摘SKINNY-64-64 is a lightweight block cipher with a 64-bit block length and key length,and it is mainly used on the Internet of Things(IoT).Currently,faults can be injected into cryptographic devices by attackers in a variety of ways,but it is still difficult to achieve a precisely located fault attacks at a low cost,whereas a Hardware Trojan(HT)can realize this.Temperature,as a physical quantity incidental to the operation of a cryptographic device,is easily overlooked.In this paper,a temperature-triggered HT(THT)is designed,which,when activated,causes a specific bit of the intermediate state of the SKINNY-64-64 to be flipped.Further,in this paper,a THT-based algebraic fault analysis(THT-AFA)method is proposed.To demonstrate the effectiveness of the method,experiments on algebraic fault analysis(AFA)and THT-AFA have been carried out on SKINNY-64-64.In the THT-AFA for SKINNY-64-64,it is only required to activate the THT 3 times to obtain the master key with a 100%success rate,and the average time for the attack is 64.57 s.However,when performing AFA on this cipher,we provide a relation-ship between the number of different faults and the residual entropy of the key.In comparison,our proposed THT-AFA method has better performance in terms of attack efficiency.To the best of our knowledge,this is the first HT attack on SKINNY-64-64.