Publication:
Password Authenticated Key Exchange-Based on Kyber for Mobile Devices

dc.authorscopusid57212212152
dc.authorscopusid15833929800
dc.authorscopusid57984799800
dc.authorwosidSeyhan, Kübra/Iyj-3199-2023
dc.authorwosidAkleylek, Sedat/D-2090-2015
dc.authorwosidDursun, Ahmet Faruk/Khd-8888-2024
dc.contributor.authorSeyhan, Kubra
dc.contributor.authorAkleylek, Sedat
dc.contributor.authorDursun, Ahmet Faruk
dc.contributor.authorIDDursun, Ahmet Faruk/0000-0003-3094-0063
dc.date.accessioned2025-12-11T01:01:27Z
dc.date.issued2024
dc.departmentOndokuz Mayıs Üniversitesien_US
dc.department-temp[Seyhan, Kubra; Dursun, Ahmet Faruk] Ondokuz Mayis Univ Samsun, Dept Comp Engn, Samsun, Turkiye; [Akleylek, Sedat] Univ Tartu, Chair Secur & Theoret Comp Sci, Tartu, Estonia; [Akleylek, Sedat] Istinye Univ, Dept Comp Engn, Istanbul, Turkiyeen_US
dc.descriptionDursun, Ahmet Faruk/0000-0003-3094-0063;en_US
dc.description.abstractIn this article, a password-authenticated key exchange (PAKE) version of the National Institute of Standards and Technology (NIST) post-quantum cryptography (PQC) public-key encryption and key-establishment standard is constructed. We mainly focused on how the PAKE version of PQC standard Kyber with mobile compatibility can be obtained by using simple structured password components. In the design process, the conventional password-based authenticated key exchange (PAK) approach is updated under the module learning with errors (MLWE) assumptions to add passwordbased authentication. Thanks to the following PAK model, the proposed Kyber.PAKE provides explicit authentication and perfect forward secrecy (PFS). The resistance analysis against the password dictionary attack of Kyber.PAKE is examined by using random oracle model (ROM) assumptions. In the security analysis, the cumulative distribution function (CDF) Zipf (CDF-Zipf) model is also followed to provide realistic security examinations. According to the implementation results, Kyber.PAKE presents better run-time than lattice-based PAKE schemes with similar features, even if it contains complex key encapsulation mechanism (KEM) components. The comparison results show that the proposed PAKE scheme will come to the fore for the future security of mobile environments and other areas.en_US
dc.description.sponsorshipEstonian Research Council [PRG946]; TUBITAK [121R006]en_US
dc.description.sponsorshipThis work was supported by the Estonian Research Council Grant no. PRG946 and TUBITAK under grant no. 121R006. The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.en_US
dc.description.woscitationindexScience Citation Index Expanded
dc.identifier.doi10.7717/peerj-cs.1960
dc.identifier.issn2376-5992
dc.identifier.pmid38660167
dc.identifier.scopus2-s2.0-85190267600
dc.identifier.scopusqualityQ1
dc.identifier.urihttps://doi.org/10.7717/peerj-cs.1960
dc.identifier.urihttps://hdl.handle.net/20.500.12712/40753
dc.identifier.volume10en_US
dc.identifier.wosWOS:001194917200003
dc.identifier.wosqualityQ2
dc.language.isoenen_US
dc.publisherPeerj Incen_US
dc.relation.ispartofPeerj Computer Scienceen_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.subjectPost-Quantum Cryptographyen_US
dc.subjectPassword-Based Authenticated Key Exchangeen_US
dc.subjectLattice-Based Cryptographyen_US
dc.titlePassword Authenticated Key Exchange-Based on Kyber for Mobile Devicesen_US
dc.typeArticleen_US
dspace.entity.typePublication

Files