Mostrar el registro sencillo del ítem
dc.contributor.author | García, Víctor | es_ES |
dc.contributor.author | Escobar Román, Santiago | es_ES |
dc.contributor.author | Ogata, Kazuhiro | es_ES |
dc.contributor.author | Akleylek, Sedat | es_ES |
dc.contributor.author | Otmani, Ayoub | es_ES |
dc.date.accessioned | 2024-06-20T18:17:12Z | |
dc.date.available | 2024-06-20T18:17:12Z | |
dc.date.issued | 2023-09-19 | es_ES |
dc.identifier.uri | http://hdl.handle.net/10251/205336 | |
dc.description.abstract | [EN] Communication and information technologies shape the world's systems of today, and those systems shape our society. The security of those systems relies on mathematical problems that are hard to solve for classical computers, that is, the available current computers. Recent advances in quantum computing threaten the security of our systems and the communications we use. In order to face this threat, multiple solutions and protocols have been proposed in the Post-Quantum Cryptography project carried on by the National Institute of Standards and Technologies. The presented work focuses on defining a formal framework in Maude for the security analysis of different postquantum key encapsulation mechanisms under assumptions given under the DolevYao model. Through the use of our framework, we construct a symbolic model to represent the behaviour of each of the participants of the protocol in a network. We then conduct reachability analysis and find a man-in-the-middle attack in each of them and a design vulnerability in Bit Flipping Key Encapsulation. For both cases, we provide some insights on possible solutions. Then, we use the Maude Linear Temporal Logic model checker to extend the analysis of the symbolic system regarding security, liveness and fairness properties. Liveness and fairness properties hold while the security property does not due to the man-in-the-middle attack and the design vulnerability in Bit Flipping Key Encapsulation. | es_ES |
dc.description.sponsorship | Victor Garcia and Santiago Escobar were supported by the grant PID2021-122830OB-C42 funded by MCIN/AEI/10.13039/501100011033 and ERDF A way of making Europe and by the grant PCI2020-120708-2 funded by MICIN/AEI/10.13039/501100011033 and by the European Union NextGenerationEU/PRTR. Kazuhiro Ogata was supported by JST SICORP Grant Number JPMJSC20C2, Japan. Sedat Akleylek was supported by TUBITAK under Grant No. 121R006. Ayoub Otmani was supported by FAVPQC project funded by CNRS and by the grant ANR-22-PETQ-0008 PQ-TLS funded by Agence Nationale de la Recherche (ANR) within France 2030 program. There was no additional external funding received for this study. The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript. | es_ES |
dc.language | Inglés | es_ES |
dc.publisher | PeerJ | es_ES |
dc.relation.ispartof | PeerJ Computer Science | es_ES |
dc.rights | Reconocimiento (by) | es_ES |
dc.subject | Maude | es_ES |
dc.subject | Rewriting logic | es_ES |
dc.subject | Formal verification | es_ES |
dc.subject | Post-quantum protocols | es_ES |
dc.subject | Key encapsulation mechanisms | es_ES |
dc.subject.classification | LENGUAJES Y SISTEMAS INFORMATICOS | es_ES |
dc.title | Modelling and verification of post-quantum key encapsulation mechanisms using Maude | es_ES |
dc.type | Artículo | es_ES |
dc.identifier.doi | 10.7717/peerj-cs.1547 | es_ES |
dc.relation.projectID | info:eu-repo/grantAgreement/AEI/Plan Estatal de Investigación Científica y Técnica y de Innovación 2017-2020/PCI2020-120708-2/ES/FORMAL ANALYSIS AND VERIFICATION OF POST-QUANTUM CRYPTOGRAPHIC PROTOCOLS/ | es_ES |
dc.relation.projectID | info:eu-repo/grantAgreement/AEI/Plan Estatal de Investigación Científica y Técnica y de Innovación 2021-2023/PID2021-122830OB-C42/ES/METODOS FORMALES ESCALABLES PARA APLICACIONES REALES/ | es_ES |
dc.relation.projectID | info:eu-repo/grantAgreement/ANR//ANR-22-PETQ-0008/FR/Post-quantum padlock for web browser/ | es_ES |
dc.relation.projectID | info:eu-repo/grantAgreement/GENERALITAT VALENCIANA//CIPROM%2F2022%2F6//TECNOLOGIAS DE APRENDIZAJE Y RAZONAMIENTO RAPIDO Y LENTO/ | es_ES |
dc.relation.projectID | info:eu-repo/grantAgreement/TUBITAK//121R006/ | es_ES |
dc.relation.projectID | info:eu-repo/grantAgreement/JST//JPMJSC20C2/ | es_ES |
dc.rights.accessRights | Abierto | es_ES |
dc.contributor.affiliation | Universitat Politècnica de València. Escola Tècnica Superior d'Enginyeria Informàtica | es_ES |
dc.description.bibliographicCitation | García, V.; Escobar Román, S.; Ogata, K.; Akleylek, S.; Otmani, A. (2023). Modelling and verification of post-quantum key encapsulation mechanisms using Maude. PeerJ Computer Science. 9. https://doi.org/10.7717/peerj-cs.1547 | es_ES |
dc.description.accrualMethod | S | es_ES |
dc.relation.publisherversion | https://doi.org/10.7717/peerj-cs.1547 | es_ES |
dc.type.version | info:eu-repo/semantics/publishedVersion | es_ES |
dc.description.volume | 9 | es_ES |
dc.identifier.eissn | 2376-5992 | es_ES |
dc.identifier.pmid | 37810329 | es_ES |
dc.identifier.pmcid | PMC10557524 | es_ES |
dc.relation.pasarela | S\508083 | es_ES |
dc.contributor.funder | European Commission | es_ES |
dc.contributor.funder | GENERALITAT VALENCIANA | es_ES |
dc.contributor.funder | AGENCIA ESTATAL DE INVESTIGACION | es_ES |
dc.contributor.funder | European Regional Development Fund | es_ES |
dc.contributor.funder | Japan Science and Technology Agency | es_ES |
dc.contributor.funder | Scientific and Technological Research Council of Turkey | es_ES |