Cargando…
Modelling and verification of post-quantum key encapsulation mechanisms using Maude
Communication and information technologies shape the world’s systems of today, and those systems shape our society. The security of those systems relies on mathematical problems that are hard to solve for classical computers, that is, the available current computers. Recent advances in quantum compu...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
PeerJ Inc.
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10557524/ https://www.ncbi.nlm.nih.gov/pubmed/37810329 http://dx.doi.org/10.7717/peerj-cs.1547 |
_version_ | 1785117108699398144 |
---|---|
author | García, Víctor Escobar, Santiago Ogata, Kazuhiro Akleylek, Sedat Otmani, Ayoub |
author_facet | García, Víctor Escobar, Santiago Ogata, Kazuhiro Akleylek, Sedat Otmani, Ayoub |
author_sort | García, Víctor |
collection | PubMed |
description | Communication and information technologies shape the world’s systems of today, and those systems shape our society. The security of those systems relies on mathematical problems that are hard to solve for classical computers, that is, the available current computers. Recent advances in quantum computing threaten the security of our systems and the communications we use. In order to face this threat, multiple solutions and protocols have been proposed in the Post-Quantum Cryptography project carried on by the National Institute of Standards and Technologies. The presented work focuses on defining a formal framework in Maude for the security analysis of different post-quantum key encapsulation mechanisms under assumptions given under the Dolev-Yao model. Through the use of our framework, we construct a symbolic model to represent the behaviour of each of the participants of the protocol in a network. We then conduct reachability analysis and find a man-in-the-middle attack in each of them and a design vulnerability in Bit Flipping Key Encapsulation. For both cases, we provide some insights on possible solutions. Then, we use the Maude Linear Temporal Logic model checker to extend the analysis of the symbolic system regarding security, liveness and fairness properties. Liveness and fairness properties hold while the security property does not due to the man-in-the-middle attack and the design vulnerability in Bit Flipping Key Encapsulation. |
format | Online Article Text |
id | pubmed-10557524 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | PeerJ Inc. |
record_format | MEDLINE/PubMed |
spelling | pubmed-105575242023-10-07 Modelling and verification of post-quantum key encapsulation mechanisms using Maude García, Víctor Escobar, Santiago Ogata, Kazuhiro Akleylek, Sedat Otmani, Ayoub PeerJ Comput Sci Cryptography Communication and information technologies shape the world’s systems of today, and those systems shape our society. The security of those systems relies on mathematical problems that are hard to solve for classical computers, that is, the available current computers. Recent advances in quantum computing threaten the security of our systems and the communications we use. In order to face this threat, multiple solutions and protocols have been proposed in the Post-Quantum Cryptography project carried on by the National Institute of Standards and Technologies. The presented work focuses on defining a formal framework in Maude for the security analysis of different post-quantum key encapsulation mechanisms under assumptions given under the Dolev-Yao model. Through the use of our framework, we construct a symbolic model to represent the behaviour of each of the participants of the protocol in a network. We then conduct reachability analysis and find a man-in-the-middle attack in each of them and a design vulnerability in Bit Flipping Key Encapsulation. For both cases, we provide some insights on possible solutions. Then, we use the Maude Linear Temporal Logic model checker to extend the analysis of the symbolic system regarding security, liveness and fairness properties. Liveness and fairness properties hold while the security property does not due to the man-in-the-middle attack and the design vulnerability in Bit Flipping Key Encapsulation. PeerJ Inc. 2023-09-19 /pmc/articles/PMC10557524/ /pubmed/37810329 http://dx.doi.org/10.7717/peerj-cs.1547 Text en ©2023 García et al. https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited. |
spellingShingle | Cryptography García, Víctor Escobar, Santiago Ogata, Kazuhiro Akleylek, Sedat Otmani, Ayoub Modelling and verification of post-quantum key encapsulation mechanisms using Maude |
title | Modelling and verification of post-quantum key encapsulation mechanisms using Maude |
title_full | Modelling and verification of post-quantum key encapsulation mechanisms using Maude |
title_fullStr | Modelling and verification of post-quantum key encapsulation mechanisms using Maude |
title_full_unstemmed | Modelling and verification of post-quantum key encapsulation mechanisms using Maude |
title_short | Modelling and verification of post-quantum key encapsulation mechanisms using Maude |
title_sort | modelling and verification of post-quantum key encapsulation mechanisms using maude |
topic | Cryptography |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10557524/ https://www.ncbi.nlm.nih.gov/pubmed/37810329 http://dx.doi.org/10.7717/peerj-cs.1547 |
work_keys_str_mv | AT garciavictor modellingandverificationofpostquantumkeyencapsulationmechanismsusingmaude AT escobarsantiago modellingandverificationofpostquantumkeyencapsulationmechanismsusingmaude AT ogatakazuhiro modellingandverificationofpostquantumkeyencapsulationmechanismsusingmaude AT akleyleksedat modellingandverificationofpostquantumkeyencapsulationmechanismsusingmaude AT otmaniayoub modellingandverificationofpostquantumkeyencapsulationmechanismsusingmaude |