Publication: Formal Specification and Model Checking of Lattice-Based Key Encapsulation Mechanisms in Maude
| dc.authorscopusid | 57218867379 | |
| dc.authorscopusid | 7201445048 | |
| dc.authorscopusid | 6701593474 | |
| dc.authorscopusid | 15833929800 | |
| dc.authorscopusid | 6602146425 | |
| dc.contributor.author | Tran, D.D. | |
| dc.contributor.author | Ogata, K. | |
| dc.contributor.author | Escobar, S. | |
| dc.contributor.author | Akleylek, S. | |
| dc.contributor.author | Otmani, A. | |
| dc.date.accessioned | 2025-12-11T00:29:44Z | |
| dc.date.issued | 2022 | |
| dc.department | Ondokuz Mayıs Üniversitesi | en_US |
| dc.department-temp | [Tran] Duong Dinh, Japan Advanced Institute of Science and Technology, Nomi, Ishikawa, Japan; [Ogata] Kazuhiro, Japan Advanced Institute of Science and Technology, Nomi, Ishikawa, Japan; [Escobar] Santiago, Universitat Politècnica de València, Valencia, Valencia, Spain; [Akleylek] Sedat, Ondokuz Mayis Üniversitesi, Samsun, Turkey, Tartu Ülikool, Tartu, Tartumaa, Estonia; [Otmani] Ayoub, Université de Rouen Normandie, Mont-Saint-Aignan, Normandie, France | en_US |
| dc.description.abstract | Advances in quantum computing have shown a serious challenge for widely used current cryptographic techniques because a sufficient large-scale quantum computer can efficiently solve hard mathematical problems on which the current public-key cryptography is relying. That is the reason why recently many researchers and industrial companies have spent lots of effort on constructing post-quantum cryptosystems, which are resistant to quantum attackers. Large numbers of post-quantum key encapsulation mechanisms (KEMs) have been proposed to provide secure key establishment - one of the most important building blocks in asymmetric cryptography. This paper presents a formal security analysis of three lattice-based KEMs: Kyber, Saber, and SK-MLWR. We first formally specify each of them in Maude, a rewriting logic-based specification and programming language equipped with many functionalities, such as a reachability analyzer (or the search command) that can be used as an invariant model checker, and then conduct invariant model checking with the Maude search command, finding an attack. © 2022 Copyright for this paper by its authors. | en_US |
| dc.identifier.endpage | 31 | en_US |
| dc.identifier.isbn | 9789666544899 | |
| dc.identifier.isbn | 9788073780029 | |
| dc.identifier.isbn | 9788024810256 | |
| dc.identifier.isbn | 9789986342748 | |
| dc.identifier.isbn | 9788073781712 | |
| dc.identifier.isbn | 9782954494807 | |
| dc.identifier.isbn | 9788024823911 | |
| dc.identifier.isbn | 9789562361989 | |
| dc.identifier.isbn | 8024810255 | |
| dc.identifier.isbn | 807378002X | |
| dc.identifier.issn | 1613-0073 | |
| dc.identifier.scopus | 2-s2.0-85142788764 | |
| dc.identifier.scopusquality | Q4 | |
| dc.identifier.startpage | 16 | en_US |
| dc.identifier.uri | https://hdl.handle.net/20.500.12712/36769 | |
| dc.identifier.volume | 3280 | en_US |
| dc.language.iso | en | en_US |
| dc.publisher | CEUR-WS | en_US |
| dc.relation.ispartof | CEUR Workshop Proceedings | en_US |
| dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
| dc.rights | info:eu-repo/semantics/closedAccess | en_US |
| dc.subject | Key Encapsulation Mechanism | en_US |
| dc.subject | Maude | en_US |
| dc.subject | Model Checking | en_US |
| dc.subject | Post-Quantum | en_US |
| dc.title | Formal Specification and Model Checking of Lattice-Based Key Encapsulation Mechanisms in Maude | en_US |
| dc.type | Conference Object | en_US |
| dspace.entity.type | Publication |
