Publication:
Formal Specification and Model Checking of Saber Lattice-Based Key Encapsulation Mechanism in Maude

dc.authorscopusid57218867379
dc.authorscopusid7201445048
dc.authorscopusid6701593474
dc.authorscopusid15833929800
dc.authorscopusid6602146425
dc.contributor.authorTran, D.D.
dc.contributor.authorOgata, K.
dc.contributor.authorEscobar, S.
dc.contributor.authorAkleylek, S.
dc.contributor.authorOtmani, A.
dc.date.accessioned2025-12-11T00:30:24Z
dc.date.issued2022
dc.departmentOndokuz Mayıs Üniversitesien_US
dc.department-temp[Tran] Duong Dinh, Japan Advanced Institute of Science and Technology, Nomi, Ishikawa, Japan; [Ogata] Kazuhiro, Japan Advanced Institute of Science and Technology, Nomi, Ishikawa, Japan; [Escobar] Santiago, Universitat Politècnica de València, Valencia, Valencia, Spain; [Akleylek] Sedat, Ondokuz Mayis Üniversitesi, Samsun, Turkey; [Otmani] Ayoub, Université de Rouen Normandie, Mont-Saint-Aignan, Normandie, Franceen_US
dc.descriptionKnowledge Systems Institute Graduate School; KSI Research Inc.en_US
dc.description.abstractThe security of most public-key cryptosystems currently in use today is threatened by advances in quantum computing. That is the reason why recently many researchers and industrial companies have spent lots of effort on constructing post-quantum cryptosystems, which are resistant to quantum attackers. A large number of post-quantum key encapsulation mechanisms (KEMs) have been proposed to provide secure key establishment - one of the most important building blocks in asymmetric cryptography. This paper presents a formal security analysis of Saber lattice-based KEM. We first formally specify the mechanism in Maude, a rewriting logic-based specification/programming language equipped with many functionalities, such as a reachability analyzer (or the search command) that can be used as an invariant model checker, and then conduct invariant model checking with the Maude search command, finding an attack. © 2022 Knowledge Systems Institute Graduate School. All rights reserved.en_US
dc.identifier.doi10.18293/SEKE2022-097
dc.identifier.endpage387en_US
dc.identifier.isbn1891706500
dc.identifier.isbn1891706594
dc.identifier.isbn1891706527
dc.identifier.isbn9781891706547
dc.identifier.isbn1891706543
dc.identifier.isbn9781891706394
dc.identifier.isbn1891706489
dc.identifier.isbn1891706330
dc.identifier.isbn1891706373
dc.identifier.isbn189170639X
dc.identifier.issn2325-9000
dc.identifier.issn2325-9086
dc.identifier.scopus2-s2.0-85137158659
dc.identifier.startpage382en_US
dc.identifier.urihttps://doi.org/10.18293/SEKE2022-097
dc.identifier.urihttps://hdl.handle.net/20.500.12712/36927
dc.language.isoenen_US
dc.publisherKnowledge Systems Institute Graduate Schoolen_US
dc.relation.ispartofProceedings of the International Conference on Software Engineering and Knowledge Engineering, SEKE -- 34th International Conference on Software Engineering and Knowledge Engineering, SEKE 2022 -- 2022-07-01 through 2022-07-10 -- Pittsburgh -- 182297en_US
dc.relation.publicationcategoryKonferans Öğesi - Uluslararası - Kurum Öğretim Elemanıen_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.subjectKEMen_US
dc.subjectLattice-Based Cryptographyen_US
dc.subjectMaudeen_US
dc.subjectModel Checkingen_US
dc.subjectPost-Quantum Cryptographyen_US
dc.titleFormal Specification and Model Checking of Saber Lattice-Based Key Encapsulation Mechanism in Maudeen_US
dc.typeConference Objecten_US
dspace.entity.typePublication

Files