Cargando…

Modelling and verification of post-quantum key encapsulation mechanisms using Maude

Communication and information technologies shape the world’s systems of today, and those systems shape our society. The security of those systems relies on mathematical problems that are hard to solve for classical computers, that is, the available current computers. Recent advances in quantum compu...

Descripción completa

Detalles Bibliográficos
Autores principales: García, Víctor, Escobar, Santiago, Ogata, Kazuhiro, Akleylek, Sedat, Otmani, Ayoub
Formato: Online Artículo Texto
Lenguaje:English
Publicado: PeerJ Inc. 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10557524/
https://www.ncbi.nlm.nih.gov/pubmed/37810329
http://dx.doi.org/10.7717/peerj-cs.1547
_version_ 1785117108699398144
author García, Víctor
Escobar, Santiago
Ogata, Kazuhiro
Akleylek, Sedat
Otmani, Ayoub
author_facet García, Víctor
Escobar, Santiago
Ogata, Kazuhiro
Akleylek, Sedat
Otmani, Ayoub
author_sort García, Víctor
collection PubMed
description Communication and information technologies shape the world’s systems of today, and those systems shape our society. The security of those systems relies on mathematical problems that are hard to solve for classical computers, that is, the available current computers. Recent advances in quantum computing threaten the security of our systems and the communications we use. In order to face this threat, multiple solutions and protocols have been proposed in the Post-Quantum Cryptography project carried on by the National Institute of Standards and Technologies. The presented work focuses on defining a formal framework in Maude for the security analysis of different post-quantum key encapsulation mechanisms under assumptions given under the Dolev-Yao model. Through the use of our framework, we construct a symbolic model to represent the behaviour of each of the participants of the protocol in a network. We then conduct reachability analysis and find a man-in-the-middle attack in each of them and a design vulnerability in Bit Flipping Key Encapsulation. For both cases, we provide some insights on possible solutions. Then, we use the Maude Linear Temporal Logic model checker to extend the analysis of the symbolic system regarding security, liveness and fairness properties. Liveness and fairness properties hold while the security property does not due to the man-in-the-middle attack and the design vulnerability in Bit Flipping Key Encapsulation.
format Online
Article
Text
id pubmed-10557524
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher PeerJ Inc.
record_format MEDLINE/PubMed
spelling pubmed-105575242023-10-07 Modelling and verification of post-quantum key encapsulation mechanisms using Maude García, Víctor Escobar, Santiago Ogata, Kazuhiro Akleylek, Sedat Otmani, Ayoub PeerJ Comput Sci Cryptography Communication and information technologies shape the world’s systems of today, and those systems shape our society. The security of those systems relies on mathematical problems that are hard to solve for classical computers, that is, the available current computers. Recent advances in quantum computing threaten the security of our systems and the communications we use. In order to face this threat, multiple solutions and protocols have been proposed in the Post-Quantum Cryptography project carried on by the National Institute of Standards and Technologies. The presented work focuses on defining a formal framework in Maude for the security analysis of different post-quantum key encapsulation mechanisms under assumptions given under the Dolev-Yao model. Through the use of our framework, we construct a symbolic model to represent the behaviour of each of the participants of the protocol in a network. We then conduct reachability analysis and find a man-in-the-middle attack in each of them and a design vulnerability in Bit Flipping Key Encapsulation. For both cases, we provide some insights on possible solutions. Then, we use the Maude Linear Temporal Logic model checker to extend the analysis of the symbolic system regarding security, liveness and fairness properties. Liveness and fairness properties hold while the security property does not due to the man-in-the-middle attack and the design vulnerability in Bit Flipping Key Encapsulation. PeerJ Inc. 2023-09-19 /pmc/articles/PMC10557524/ /pubmed/37810329 http://dx.doi.org/10.7717/peerj-cs.1547 Text en ©2023 García et al. https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited.
spellingShingle Cryptography
García, Víctor
Escobar, Santiago
Ogata, Kazuhiro
Akleylek, Sedat
Otmani, Ayoub
Modelling and verification of post-quantum key encapsulation mechanisms using Maude
title Modelling and verification of post-quantum key encapsulation mechanisms using Maude
title_full Modelling and verification of post-quantum key encapsulation mechanisms using Maude
title_fullStr Modelling and verification of post-quantum key encapsulation mechanisms using Maude
title_full_unstemmed Modelling and verification of post-quantum key encapsulation mechanisms using Maude
title_short Modelling and verification of post-quantum key encapsulation mechanisms using Maude
title_sort modelling and verification of post-quantum key encapsulation mechanisms using maude
topic Cryptography
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10557524/
https://www.ncbi.nlm.nih.gov/pubmed/37810329
http://dx.doi.org/10.7717/peerj-cs.1547
work_keys_str_mv AT garciavictor modellingandverificationofpostquantumkeyencapsulationmechanismsusingmaude
AT escobarsantiago modellingandverificationofpostquantumkeyencapsulationmechanismsusingmaude
AT ogatakazuhiro modellingandverificationofpostquantumkeyencapsulationmechanismsusingmaude
AT akleyleksedat modellingandverificationofpostquantumkeyencapsulationmechanismsusingmaude
AT otmaniayoub modellingandverificationofpostquantumkeyencapsulationmechanismsusingmaude