Mostrar el registro sencillo del ítem
dc.contributor.author | García, Víctor | es_ES |
dc.contributor.author | Escobar Román, Santiago | es_ES |
dc.contributor.author | Ogata, Kazuhiro | es_ES |
dc.date.accessioned | 2023-07-24T18:02:31Z | |
dc.date.available | 2023-07-24T18:02:31Z | |
dc.date.issued | 2022 | es_ES |
dc.identifier.issn | 1613-0073 | es_ES |
dc.identifier.uri | http://hdl.handle.net/10251/195419 | |
dc.description.abstract | [EN] Communication and information technologies shape the world¿s systems of today, and those systems shape the society we live in. The security of those systems relay on mathematical problems hard to solve for classical computers, that is, the available current computers. Recent advances in quantum computing threat the security of our systems and the communications we use. In order to face the threat, multiple solutions and protocols have been proposed. Kyber is one of them, specifically it is a key encapsulation mechanism that bases its security in the learning with errors problem over module lattices. This master¿s thesis focuses on the analysis of Kyber to check its security under Dolev-Yao adversary assumptions. For that matter, we first learn about the current state of the solutions proposed against the threat quantum adversaries suppose and study how Kyber works. We then construct in the system-specification language Maude, a symbolic model to represent the behaviour of Kyber in a network. On this model we conduct reachability analysis with the search command and find that a Man-In-The-Middle attack is present. Then we use the Maude LTL logical model checker to extend the analysis of the system with proving if a liveness and a security property hold. | es_ES |
dc.language | Inglés | es_ES |
dc.publisher | Sun SITE Central Europe | es_ES |
dc.relation.ispartof | CEUR Workshop Proceedings | es_ES |
dc.rights | Reconocimiento (by) | es_ES |
dc.subject | Maude | es_ES |
dc.subject | Rewriting logic | es_ES |
dc.subject | Formal verification | es_ES |
dc.subject | Post-quantum protocols | es_ES |
dc.subject | Key encapsulation mechanisms | es_ES |
dc.subject.classification | LENGUAJES Y SISTEMAS INFORMATICOS | es_ES |
dc.title | Modeling and verification of the post-quantum key encapsulation mechanism KYBER using Maude | es_ES |
dc.type | Artículo | es_ES |
dc.relation.projectID | info:eu-repo/grantAgreement/AEI/Plan Estatal de Investigación Científica y Técnica y de Innovación 2017-2020/PCI2020-120708-2/ES/FORMAL ANALYSIS AND VERIFICATION OF POST-QUANTUM CRYPTOGRAPHIC PROTOCOLS/ | es_ES |
dc.relation.projectID | info:eu-repo/grantAgreement/AEI//PID2021-122830OB-C42//MÉTODOS FORMALES ESCALABLES PARA APLICACIONES REALES/ | es_ES |
dc.relation.projectID | info:eu-repo/grantAgreement/GENERALITAT VALENCIANA//PROMETEO%2F2019%2F098//DEEPTRUST/ | es_ES |
dc.rights.accessRights | Abierto | es_ES |
dc.contributor.affiliation | Universitat Politècnica de València. Escola Tècnica Superior d'Enginyeria Informàtica | es_ES |
dc.description.bibliographicCitation | García, V.; Escobar Román, S.; Ogata, K. (2022). Modeling and verification of the post-quantum key encapsulation mechanism KYBER using Maude. CEUR Workshop Proceedings. 3280:32-49. http://hdl.handle.net/10251/195419 | es_ES |
dc.description.accrualMethod | S | es_ES |
dc.relation.publisherversion | https://ceur-ws.org/Vol-3280/ | es_ES |
dc.description.upvformatpinicio | 32 | es_ES |
dc.description.upvformatpfin | 49 | es_ES |
dc.type.version | info:eu-repo/semantics/publishedVersion | es_ES |
dc.description.volume | 3280 | es_ES |
dc.relation.pasarela | S\485024 | es_ES |
dc.contributor.funder | GENERALITAT VALENCIANA | es_ES |
dc.contributor.funder | AGENCIA ESTATAL DE INVESTIGACION | es_ES |