Publication:
Kyber, Saber, and SK-MLWR Lattice-Based Key Encapsulation Mechanisms Model Checking With Maude

dc.authorscopusid57218867379
dc.authorscopusid7201445048
dc.authorscopusid6701593474
dc.authorscopusid15833929800
dc.authorscopusid6602146425
dc.authorwosidEscobar, Santiago/C-9589-2012
dc.authorwosidAkleylek, Sedat/D-2090-2015
dc.authorwosidEscobar, Santiago/Aal-3399-2020
dc.authorwosidOtmani, Ayoub/Aak-6620-2020
dc.authorwosidDinh Tran, Duong/Kgl-8109-2024
dc.contributor.authorTran, Duong Dinh
dc.contributor.authorOgata, Kazuhiro
dc.contributor.authorEscobar, Santiago
dc.contributor.authorAkleylek, Sedat
dc.contributor.authorOtmani, Ayoub
dc.contributor.authorHaines, Thomas
dc.contributor.authorIDEscobar, Santiago/0000-0002-3550-4781
dc.contributor.authorIDAkleylek, Sedat/0000-0001-7005-6489
dc.contributor.authorIDOtmani, Ayoub/0000-0001-8176-8692
dc.date.accessioned2025-12-11T01:29:03Z
dc.date.issued2023
dc.departmentOndokuz Mayıs Üniversitesien_US
dc.department-temp[Tran, Duong Dinh; Ogata, Kazuhiro] Japan Adv Inst Sci & Technol, Ishikawa 9231292, Japan; [Escobar, Santiago] Univ Politecn Valencia, VRAIN, Valencia, Spain; [Akleylek, Sedat] Ondokuz Mayis Univ, Samsun, Turkiye; [Akleylek, Sedat] Univ Tartu, Tartu, Estonia; [Otmani, Ayoub] Univ Rouen Normandie, Rouen, Franceen_US
dc.descriptionEscobar, Santiago/0000-0002-3550-4781; Akleylek, Sedat/0000-0001-7005-6489; Otmani, Ayoub/0000-0001-8176-8692;en_US
dc.description.abstractFacing the potential threat raised by quantum computing, a great deal of research from many groups and industrial giants has gone into building public-key post-quantum cryptographic primitives that are resistant to the quantum attackers. Among them, there is a large number of post-quantum key encapsulation mechanisms (KEMs), whose purpose is to provide a secure key exchange, which is a very crucial component in public-key cryptography. This paper presents a formal security analysis of three lattice-based KEMs including Kyber, Saber, and SK-MLWR. We use Maude, a specification language supporting equational and rewriting logic and a high-performance tool equipped with many advanced features, such as a reachability analyzer that can be used as a model checker for invariant properties, to model the three KEMs as state machines. Because they all belong to the class of lattice-based KEMs, they share many common parts in their designs, such as polynomials, vectors, and message exchange patterns. We first model these common parts and combine them into a specification, called base specification. After that, for each of the three KEMs, by extending the base specification, we just need to model some additional parts and the mechanism execution. Once completing the three specifications, we conduct invariant model checkings with the Maude search command, pointing out a similar man-in-the-middle attack. The occurrence of this attack is due to the fact that authentication is not part of the KEMs, and therefore an active attacker can modify all communication between two honest parties.en_US
dc.description.sponsorshipTran and Ogata have been supported by JST SICORP (Grant Number JPMJSC20C2), Japan. Escobar has been partially supported by the grant PID2021-122830OB-C42 funded by MCIN/AEI/10.13039/501100011033 and ERDF A way of making Europe, by the grant CIPROM/2022/6 f [JPMJSC20C2, PID2021-122830OB-C42, MCIN/AEI/10.13039/501100011033]; JST SICORP [CIPROM/2022/6]; ERDF A way of making Europe [PCI2020-120708-2, MICIN/AEI/10.13039/501100011033]; Generalitat Valenciana; European Union NextGenerationEU/PRTR [121R006]; TUBITAK [ANR-22-PETQ-0008 PQ-TLS]; CNRS; Agence Nationale de la Rechercheen_US
dc.description.sponsorshipTran and Ogata have been supported by JST SICORP (Grant Number JPMJSC20C2), Japan. Escobar has been partially supported by the grant PID2021-122830OB-C42 funded by MCIN/AEI/10.13039/501100011033 and ERDF A way of making Europe, by the grant CIPROM/2022/6 funded by Generalitat Valenciana, and by the grant PCI2020-120708-2 funded by MICIN/AEI/10.13039/501100011033 and by the European Union NextGenerationEU/PRTR. Akleylek has been partially supported by TUBITAK under grant number 121R006. Otmani has been supported by the FAVPQC project funded by CNRS and by the grant ANR-22-PETQ-0008 PQ-TLS funded by Agence Nationale de la Recherche (ANR) within France 2030 program.en_US
dc.description.woscitationindexScience Citation Index Expanded
dc.identifier.doi10.1049/2023/9399887
dc.identifier.issn1751-8709
dc.identifier.issn1751-8717
dc.identifier.scopus2-s2.0-85190990170
dc.identifier.scopusqualityQ3
dc.identifier.urihttps://doi.org/10.1049/2023/9399887
dc.identifier.urihttps://hdl.handle.net/20.500.12712/43999
dc.identifier.volume2023en_US
dc.identifier.wosWOS:001098855200001
dc.identifier.wosqualityQ2
dc.language.isoenen_US
dc.publisherWileyen_US
dc.relation.ispartofIET Information Securityen_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.titleKyber, Saber, and SK-MLWR Lattice-Based Key Encapsulation Mechanisms Model Checking With Maudeen_US
dc.typeArticleen_US
dspace.entity.typePublication

Files