Publication:
Formal Analysis of Post-Quantum Hybrid Key Exchange SSH Transport Layer Protocol

dc.authorscopusid57218867379
dc.authorscopusid7201445048
dc.authorscopusid6701593474
dc.authorscopusid15833929800
dc.authorscopusid6602146425
dc.authorwosidDinh Tran, Duong/Kgl-8109-2024
dc.authorwosidAkleylek, Sedat/D-2090-2015
dc.authorwosidEscobar, Santiago/Aal-3399-2020
dc.authorwosidOtmani, Ayoub/Aak-6620-2020
dc.contributor.authorTran, Duong Dinh
dc.contributor.authorOgata, Kazuhiro
dc.contributor.authorEscobar, Santiago
dc.contributor.authorAkleylek, Sedat
dc.contributor.authorOtmani, Ayoub
dc.contributor.authorIDAkleylek, Sedat/0000-0001-7005-6489
dc.contributor.authorIDDinh Tran, Duong/0000-0001-7092-2084
dc.date.accessioned2025-12-11T01:15:59Z
dc.date.issued2024
dc.departmentOndokuz Mayıs Üniversitesien_US
dc.department-temp[Tran, Duong Dinh; Ogata, Kazuhiro] Japan Adv Inst Sci & Technol, Nomi, Ishikawa 9231211, Japan; [Escobar, Santiago] Univ Politecn Valencia, VRAIN, Valencia 46022, Spain; [Akleylek, Sedat] Ondokuz Mayis Univ, TR-55139 Samsun, Turkiye; [Akleylek, Sedat] Univ Tartu, EE-50090 Tartu, Estonia; [Otmani, Ayoub] Univ Rouen Normandie, F-76821 Rouen, Franceen_US
dc.descriptionAkleylek, Sedat/0000-0001-7005-6489; Dinh Tran, Duong/0000-0001-7092-2084;en_US
dc.description.abstractFacing the quantum attack threat, a quantum-resistant version of the SSH Transport Layer protocol has been proposed and been standardized by an IETF working group. This standardization process has been motivated by the fact that if practical quantum computers become available, classical key exchange algorithms used today will no longer be safe because their security can be efficiently broken by Shor's algorithm running on a quantum computer. In this paper, we construct a symbolic model of the proposed protocol, specify it in the specification language CafeOBJ, and conduct a formal analysis of the claimed security properties with the employment of a formal method tool called Invariant Proof Score Generator (IPSG). Three security properties are formally verified with respect to an unbounded number of protocol participants and protocol executions by employing IPSG to produce their formal proofs, the so- called proof scores in CafeOBJ. With another property, namely authentication, we find a counterexample against it, and then we propose to slightly revise the protocol. With the improved version, we formally verify that the authentication property is enjoyed, while the three properties remain secure. To model the presence of malicious participants, we extend the Dolev-Yao intruder, which is the standard intruder model used in security protocol analysis/verification, because the availability assumption of large-scale quantum computers gives the attacker some new capabilities. Under our threat model, the intruder is given capabilities of fully controlling the network as the Dolev-Yao intruder, and additionally breaking ECDH's security as well as compromising secrets.en_US
dc.description.sponsorshipJST SICORP, Japanen_US
dc.description.sponsorshipNo Statement Availableen_US
dc.description.woscitationindexScience Citation Index Expanded
dc.identifier.doi10.1109/ACCESS.2023.3347914
dc.identifier.endpage1687en_US
dc.identifier.issn2169-3536
dc.identifier.scopus2-s2.0-85181556188
dc.identifier.scopusqualityQ1
dc.identifier.startpage1672en_US
dc.identifier.urihttps://doi.org/10.1109/ACCESS.2023.3347914
dc.identifier.urihttps://hdl.handle.net/20.500.12712/42466
dc.identifier.volume12en_US
dc.identifier.wosWOS:001137628700001
dc.identifier.wosqualityQ2
dc.language.isoenen_US
dc.publisherIEEE-Inst Electrical Electronics Engineers Incen_US
dc.relation.ispartofIEEE Accessen_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.subjectProtocolsen_US
dc.subjectSecurityen_US
dc.subjectQuantum Computingen_US
dc.subjectPublic Keyen_US
dc.subjectFormal Verificationen_US
dc.subjectEncryptionen_US
dc.subjectAuthenticationen_US
dc.subjectPost-Quantum SSHen_US
dc.subjectCafeOBJen_US
dc.subjectProof Scoreen_US
dc.subjectSecurity Analysisen_US
dc.titleFormal Analysis of Post-Quantum Hybrid Key Exchange SSH Transport Layer Protocolen_US
dc.typeArticleen_US
dspace.entity.typePublication

Files