Mostrar el registro sencillo del ítem

Ponencia

dc.contributor.editorVarela Vaca, Ángel Jesúses
dc.contributor.editorCeballos Guerrero, Rafaeles
dc.contributor.editorReina Quintero, Antonia Maríaes
dc.creatorGarcía, Victores
dc.creatorEscobar, Santiagoes
dc.creatorOgata, Kazuhiroes
dc.creatorAkleylek, Sedates
dc.creatorOtmani, Ayoubes
dc.date.accessioned2024-07-19T10:07:53Z
dc.date.available2024-07-19T10:07:53Z
dc.date.issued2024
dc.identifier.citationGarcía, V., Escobar, S., Ogata, K., Akleylek, S. y Otmani, A. (2024). Modelling and verification of post-quantum key encapsulation mechanisms using Maude [Póster]. En Jornadas Nacionales de Investigación en Ciberseguridad (JNIC) (9ª.2024. Sevilla) (470-471), Sevilla: Universidad de Sevilla. Escuela Técnica Superior de Ingeniería Informática.
dc.identifier.isbn978-84-09-62140-8es
dc.identifier.urihttps://hdl.handle.net/11441/161554
dc.description.abstractThe security of information systems relies on math ematical problems that are hard to solve. Quantum computing threatens the security of our systems and communications. Kyber, BIKE and Classic McEliece are three candidates in the Post-Quantum Cryptography project launched by the National Institute of Standards and Technologies. We propose a formal framework in Maude for the security analysis of post quantum key encapsulation mechanisms. With our framework, we construct a symbolic model for each candidate. Through reachability analysis, we find both a man-in-the-middle attack in each of them and a design vulnerability in BIKE. For both cases, we provide some possible solutions. Then, we use Maude’s Linear Temporal Logic model checker to extend the analysis of the symbolic system regarding security, liveness and fairness properties. Liveness and fairness properties hold but the security property does not due to the man-in-the-middle attack and the design vulnerability in BIKE.es
dc.formatapplication/pdfes
dc.format.extent2es
dc.language.isoenges
dc.publisherUniversidad de Sevilla. Escuela Técnica Superior de Ingeniería Informáticaes
dc.relation.ispartofJornadas Nacionales de Investigación en Ciberseguridad (JNIC) (9ª.2024. Sevilla) (2024), pp. 470-471.
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 Internacional*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/*
dc.subjectMaudees
dc.subjectRewriting logices
dc.subjectFormal verificationes
dc.subjectPost-quantum protocolses
dc.subjectKey encapsulation mechanismses
dc.titleModelling and verification of post-quantum key encapsulation mechanisms using Maude [Póster]es
dc.typeinfo:eu-repo/semantics/conferenceObjectes
dc.type.versioninfo:eu-repo/semantics/publishedVersiones
dc.rights.accessRightsinfo:eu-repo/semantics/openAccesses
dc.publication.initialPage470es
dc.publication.endPage471es
dc.eventtitleJornadas Nacionales de Investigación en Ciberseguridad (JNIC) (9ª.2024. Sevilla)es
dc.eventinstitutionSevillaes
dc.relation.publicationplaceSevillaes

FicherosTamañoFormatoVerDescripción
JNIC24_458 OK.pdf376.3KbIcon   [PDF] Ver/Abrir  

Este registro aparece en las siguientes colecciones

Mostrar el registro sencillo del ítem

Attribution-NonCommercial-NoDerivatives 4.0 Internacional
Excepto si se señala otra cosa, la licencia del ítem se describe como: Attribution-NonCommercial-NoDerivatives 4.0 Internacional