Publication: Kyber, Saber, and SK-MLWR Lattice-Based Key Encapsulation Mechanisms Model Checking With Maude
| dc.authorscopusid | 57218867379 | |
| dc.authorscopusid | 7201445048 | |
| dc.authorscopusid | 6701593474 | |
| dc.authorscopusid | 15833929800 | |
| dc.authorscopusid | 6602146425 | |
| dc.authorwosid | Escobar, Santiago/C-9589-2012 | |
| dc.authorwosid | Akleylek, Sedat/D-2090-2015 | |
| dc.authorwosid | Escobar, Santiago/Aal-3399-2020 | |
| dc.authorwosid | Otmani, Ayoub/Aak-6620-2020 | |
| dc.authorwosid | Dinh Tran, Duong/Kgl-8109-2024 | |
| dc.contributor.author | Tran, Duong Dinh | |
| dc.contributor.author | Ogata, Kazuhiro | |
| dc.contributor.author | Escobar, Santiago | |
| dc.contributor.author | Akleylek, Sedat | |
| dc.contributor.author | Otmani, Ayoub | |
| dc.contributor.author | Haines, Thomas | |
| dc.contributor.authorID | Escobar, Santiago/0000-0002-3550-4781 | |
| dc.contributor.authorID | Akleylek, Sedat/0000-0001-7005-6489 | |
| dc.contributor.authorID | Otmani, Ayoub/0000-0001-8176-8692 | |
| dc.date.accessioned | 2025-12-11T01:29:03Z | |
| dc.date.issued | 2023 | |
| dc.department | Ondokuz Mayıs Üniversitesi | en_US |
| dc.department-temp | [Tran, Duong Dinh; Ogata, Kazuhiro] Japan Adv Inst Sci & Technol, Ishikawa 9231292, Japan; [Escobar, Santiago] Univ Politecn Valencia, VRAIN, Valencia, Spain; [Akleylek, Sedat] Ondokuz Mayis Univ, Samsun, Turkiye; [Akleylek, Sedat] Univ Tartu, Tartu, Estonia; [Otmani, Ayoub] Univ Rouen Normandie, Rouen, France | en_US |
| dc.description | Escobar, Santiago/0000-0002-3550-4781; Akleylek, Sedat/0000-0001-7005-6489; Otmani, Ayoub/0000-0001-8176-8692; | en_US |
| dc.description.abstract | Facing the potential threat raised by quantum computing, a great deal of research from many groups and industrial giants has gone into building public-key post-quantum cryptographic primitives that are resistant to the quantum attackers. Among them, there is a large number of post-quantum key encapsulation mechanisms (KEMs), whose purpose is to provide a secure key exchange, which is a very crucial component in public-key cryptography. This paper presents a formal security analysis of three lattice-based KEMs including Kyber, Saber, and SK-MLWR. We use Maude, a specification language supporting equational and rewriting logic and a high-performance tool equipped with many advanced features, such as a reachability analyzer that can be used as a model checker for invariant properties, to model the three KEMs as state machines. Because they all belong to the class of lattice-based KEMs, they share many common parts in their designs, such as polynomials, vectors, and message exchange patterns. We first model these common parts and combine them into a specification, called base specification. After that, for each of the three KEMs, by extending the base specification, we just need to model some additional parts and the mechanism execution. Once completing the three specifications, we conduct invariant model checkings with the Maude search command, pointing out a similar man-in-the-middle attack. The occurrence of this attack is due to the fact that authentication is not part of the KEMs, and therefore an active attacker can modify all communication between two honest parties. | en_US |
| dc.description.sponsorship | Tran and Ogata have been supported by JST SICORP (Grant Number JPMJSC20C2), Japan. Escobar has been partially supported by the grant PID2021-122830OB-C42 funded by MCIN/AEI/10.13039/501100011033 and ERDF A way of making Europe, by the grant CIPROM/2022/6 f [JPMJSC20C2, PID2021-122830OB-C42, MCIN/AEI/10.13039/501100011033]; JST SICORP [CIPROM/2022/6]; ERDF A way of making Europe [PCI2020-120708-2, MICIN/AEI/10.13039/501100011033]; Generalitat Valenciana; European Union NextGenerationEU/PRTR [121R006]; TUBITAK [ANR-22-PETQ-0008 PQ-TLS]; CNRS; Agence Nationale de la Recherche | en_US |
| dc.description.sponsorship | Tran and Ogata have been supported by JST SICORP (Grant Number JPMJSC20C2), Japan. Escobar has been partially supported by the grant PID2021-122830OB-C42 funded by MCIN/AEI/10.13039/501100011033 and ERDF A way of making Europe, by the grant CIPROM/2022/6 funded by Generalitat Valenciana, and by the grant PCI2020-120708-2 funded by MICIN/AEI/10.13039/501100011033 and by the European Union NextGenerationEU/PRTR. Akleylek has been partially supported by TUBITAK under grant number 121R006. Otmani has been supported by the FAVPQC project funded by CNRS and by the grant ANR-22-PETQ-0008 PQ-TLS funded by Agence Nationale de la Recherche (ANR) within France 2030 program. | en_US |
| dc.description.woscitationindex | Science Citation Index Expanded | |
| dc.identifier.doi | 10.1049/2023/9399887 | |
| dc.identifier.issn | 1751-8709 | |
| dc.identifier.issn | 1751-8717 | |
| dc.identifier.scopus | 2-s2.0-85190990170 | |
| dc.identifier.scopusquality | Q3 | |
| dc.identifier.uri | https://doi.org/10.1049/2023/9399887 | |
| dc.identifier.uri | https://hdl.handle.net/20.500.12712/43999 | |
| dc.identifier.volume | 2023 | en_US |
| dc.identifier.wos | WOS:001098855200001 | |
| dc.identifier.wosquality | Q2 | |
| dc.language.iso | en | en_US |
| dc.publisher | Wiley | en_US |
| dc.relation.ispartof | IET Information Security | en_US |
| dc.relation.publicationcategory | Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı | en_US |
| dc.rights | info:eu-repo/semantics/openAccess | en_US |
| dc.title | Kyber, Saber, and SK-MLWR Lattice-Based Key Encapsulation Mechanisms Model Checking With Maude | en_US |
| dc.type | Article | en_US |
| dspace.entity.type | Publication |
