Publication:
Modelling and Verification of Post-Quantum Key Encapsulation Mechanisms Using Maude

dc.authorscopusid57984256500
dc.authorscopusid6701593474
dc.authorscopusid7201445048
dc.authorscopusid15833929800
dc.authorscopusid6602146425
dc.authorwosidMoreno, Victor/Gnn-0449-2022
dc.authorwosidOtmani, Ayoub/Aak-6620-2020
dc.authorwosidEscobar, Santiago/Aal-3399-2020
dc.authorwosidAkleylek, Sedat/D-2090-2015
dc.contributor.authorGarcia, Victor
dc.contributor.authorEscobar, Santiago
dc.contributor.authorOgata, Kazuhiro
dc.contributor.authorAkleylek, Sedat
dc.contributor.authorOtmani, Ayoub
dc.contributor.authorIDGarcía Valero, Víctor/0000-0003-0681-1130
dc.date.accessioned2025-12-11T01:02:23Z
dc.date.issued2023
dc.departmentOndokuz Mayıs Üniversitesien_US
dc.department-temp[Garcia, Victor; Escobar, Santiago] Univ Politecn Valencia, Valencia, Spain; [Ogata, Kazuhiro] Japan Adv Inst Sci & Technol, Ishikawa, Japan; [Akleylek, Sedat] Ondokuz Mayis Univ, Samsun, Turkiye; [Akleylek, Sedat] Univ Tartu, Tartu, Estonia; [Otmani, Ayoub] Univ Rouen Normandie, Rouen, Franceen_US
dc.descriptionGarcía Valero, Víctor/0000-0003-0681-1130;en_US
dc.description.abstractCommunication and information technologies shape the world's systems of today, and those systems shape our society. The security of those systems relies on mathematical problems that are hard to solve for classical computers, that is, the available current computers. Recent advances in quantum computing threaten the security of our systems and the communications we use. In order to face this threat, multiple solutions and protocols have been proposed in the Post-Quantum Cryptography project carried on by the National Institute of Standards and Technologies. The presented work focuses on defining a formal framework in Maude for the security analysis of different postquantum key encapsulation mechanisms under assumptions given under the DolevYao model. Through the use of our framework, we construct a symbolic model to represent the behaviour of each of the participants of the protocol in a network. We then conduct reachability analysis and find a man-in-the-middle attack in each of them and a design vulnerability in Bit Flipping Key Encapsulation. For both cases, we provide some insights on possible solutions. Then, we use the Maude Linear Temporal Logic model checker to extend the analysis of the symbolic system regarding security, liveness and fairness properties. Liveness and fairness properties hold while the security property does not due to the man-in-the-middle attack and the design vulnerability in Bit Flipping Key Encapsulation.en_US
dc.description.sponsorshipMCIN/AEI [PID2021-122830OB-C42, PCI2020-120708-2]; ERDF A way of making Europe; European Union NextGenerationEU/PRTR; JST SICORP, Japan [JPMJSC20C2]; TUBITAK [121R006]; FAVPQC project - CNRS; Agence Nationale de la Recherche (ANR) [ANR-22-PETQ-0008 PQ-TLS]en_US
dc.description.sponsorshipVictor Garcia and Santiago Escobar were supported by the grant PID2021-122830OB-C42 funded by MCIN/AEI/10.13039/501100011033 and ERDF A way of making Europe and by the grant PCI2020-120708-2 funded by MICIN/AEI/10.13039/501100011033 and by the European Union NextGenerationEU/PRTR. Kazuhiro Ogata was supported by JST SICORP Grant Number JPMJSC20C2, Japan. Sedat Akleylek was supported by TUBITAK under Grant No. 121R006. Ayoub Otmani was supported by FAVPQC project funded by CNRS and by the grant ANR-22-PETQ-0008 PQ-TLS funded by Agence Nationale de la Recherche (ANR) within France 2030 program. There was no additional external funding received for this study. The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.en_US
dc.description.woscitationindexScience Citation Index Expanded
dc.identifier.doi10.7717/peerj-cs.1547
dc.identifier.issn2376-5992
dc.identifier.pmid37810329
dc.identifier.scopus2-s2.0-85172275257
dc.identifier.scopusqualityQ1
dc.identifier.urihttps://doi.org/10.7717/peerj-cs.1547
dc.identifier.urihttps://hdl.handle.net/20.500.12712/40854
dc.identifier.volume9en_US
dc.identifier.wosWOS:001072394500001
dc.identifier.wosqualityQ2
dc.language.isoenen_US
dc.publisherPeerj Incen_US
dc.relation.ispartofPeerj Computer Scienceen_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.subjectMaudeen_US
dc.subjectRewriting Logicen_US
dc.subjectFormal Verificationen_US
dc.subjectPost-Quantum Protocolsen_US
dc.subjectKey Encapsulation Mechanismsen_US
dc.titleModelling and Verification of Post-Quantum Key Encapsulation Mechanisms Using Maudeen_US
dc.typeArticleen_US
dspace.entity.typePublication

Files