Mathematics / Matematik
Permanent URI for this collectionhttps://hdl.handle.net/11147/8
Browse
Search Results
Article Unique decompositions into regular ideals for Marot rings(Taylor & Francis, 2022) Ay Saylam, Başak; Gürbüz, EzgiLet R be a commutative ring. We say that R has the unique decomposition into regular ideals (UDRI) property if, for any R-module which decomposes into a finite direct sum of regular ideals, this decomposition is unique up to the order and isomorphism class of the regular ideals. In this paper, we will prove some preliminary results for Marot rings whose regular ideals are finitely generated and give a necessary and sufficient condition for these rings to satisfy the UDRI property.Article Citation - WoS: 2Citation - Scopus: 2On simple-injective modules(World Scientific Publishing, 2022) Alagöz, Yusuf; Benli Göral, Sinem; Büyükaşık, EnginFor a right module M, we prove that M is simple-injective if and only if M is min-N-injective for every cyclic right module N. The rings whose simple-injective right modules are injective are exactly the right Artinian rings. A right Noetherian ring is right Artinian if and only if every cyclic simple-injective right module is injective. The ring is QF if and only if simple-injective right modules are projective. For a commutative Noetherian ring R, we prove that every finitely generated simple-injective R-module is projective if and only if R = A × B, where A is QF and B is hereditary. An abelian group is simple-injective if and only if its torsion part is injective. We show that the notions of simple-injective, strongly simple-injective, soc-injective and strongly soc-injective coincide over the ring of integers.Article Citation - WoS: 2Citation - Scopus: 3Integral Characteristics by Keyspace Partitioning(Springer, 2022) Demirbaş, Fatih; Kara, OrhunIn this work, we introduce a new method we call integral by keyspace partitioning to construct integral characteristics for some block ciphers by introducing new integral properties. We introduce the concepts of active with constant difference and identically active integral properties. Then, we divide the key space into equivalence classes and construct integral characteristics for each equivalence class individually by using these integral properties. We exploit the binary diffusion layer and key schedule algorithm of a block cipher to propagate these integral properties through rounds. We apply the new method to the Byte-oriented Substitution-Permutation Network (BSPN) cipher and Midori64 to show its effectiveness. We construct the first iterative integral characteristic for a block cipher to the best of our knowledge. We extend this iterative characteristic for the (M, n)-(BSPN) block cipher where each block of BSPN contains M number of n× n S-Boxes with the block and key sizes M· n. Using at most (M-12)+1 (only 106 when M= 16) chosen plaintexts, we mount key recovery attacks for the first time on BSPN and recover the key for the full round. The time complexity of the key recovery is almost independent of the number of rounds. We also use our method to construct an integral characteristic for Midori64, which can be utilized for a key recovery attack on 11-round Midori64. Our results impose a new security criteria for the design of the key schedule algorithm for some block ciphers.
