Publication:
Formal Specification and Model Checking of Lattice-Based Key Encapsulation Mechanisms in Maude

dc.authorscopusid57218867379
dc.authorscopusid7201445048
dc.authorscopusid6701593474
dc.authorscopusid15833929800
dc.authorscopusid6602146425
dc.contributor.authorTran, D.D.
dc.contributor.authorOgata, K.
dc.contributor.authorEscobar, S.
dc.contributor.authorAkleylek, S.
dc.contributor.authorOtmani, A.
dc.date.accessioned2025-12-11T00:29:44Z
dc.date.issued2022
dc.departmentOndokuz Mayıs Üniversitesien_US
dc.department-temp[Tran] Duong Dinh, Japan Advanced Institute of Science and Technology, Nomi, Ishikawa, Japan; [Ogata] Kazuhiro, Japan Advanced Institute of Science and Technology, Nomi, Ishikawa, Japan; [Escobar] Santiago, Universitat Politècnica de València, Valencia, Valencia, Spain; [Akleylek] Sedat, Ondokuz Mayis Üniversitesi, Samsun, Turkey, Tartu Ülikool, Tartu, Tartumaa, Estonia; [Otmani] Ayoub, Université de Rouen Normandie, Mont-Saint-Aignan, Normandie, Franceen_US
dc.description.abstractAdvances in quantum computing have shown a serious challenge for widely used current cryptographic techniques because a sufficient large-scale quantum computer can efficiently solve hard mathematical problems on which the current public-key cryptography is relying. That is the reason why recently many researchers and industrial companies have spent lots of effort on constructing post-quantum cryptosystems, which are resistant to quantum attackers. Large numbers of post-quantum key encapsulation mechanisms (KEMs) have been proposed to provide secure key establishment - one of the most important building blocks in asymmetric cryptography. This paper presents a formal security analysis of three lattice-based KEMs: Kyber, Saber, and SK-MLWR. We first formally specify each of them in Maude, a rewriting logic-based specification and programming language equipped with many functionalities, such as a reachability analyzer (or the search command) that can be used as an invariant model checker, and then conduct invariant model checking with the Maude search command, finding an attack. © 2022 Copyright for this paper by its authors.en_US
dc.identifier.endpage31en_US
dc.identifier.isbn9789666544899
dc.identifier.isbn9788073780029
dc.identifier.isbn9788024810256
dc.identifier.isbn9789986342748
dc.identifier.isbn9788073781712
dc.identifier.isbn9782954494807
dc.identifier.isbn9788024823911
dc.identifier.isbn9789562361989
dc.identifier.isbn8024810255
dc.identifier.isbn807378002X
dc.identifier.issn1613-0073
dc.identifier.scopus2-s2.0-85142788764
dc.identifier.scopusqualityQ4
dc.identifier.startpage16en_US
dc.identifier.urihttps://hdl.handle.net/20.500.12712/36769
dc.identifier.volume3280en_US
dc.language.isoenen_US
dc.publisherCEUR-WSen_US
dc.relation.ispartofCEUR Workshop Proceedingsen_US
dc.relation.publicationcategoryKonferans Öğesi - Uluslararası - Kurum Öğretim Elemanıen_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.subjectKey Encapsulation Mechanismen_US
dc.subjectMaudeen_US
dc.subjectModel Checkingen_US
dc.subjectPost-Quantumen_US
dc.titleFormal Specification and Model Checking of Lattice-Based Key Encapsulation Mechanisms in Maudeen_US
dc.typeConference Objecten_US
dspace.entity.typePublication

Files