Password authenticated key exchange-based on Kyber for mobile devices
dc.authorid | Dursun, Ahmet Faruk/0000-0003-3094-0063 | |
dc.contributor.author | Seyhan, Kubra | |
dc.contributor.author | Akleylek, Sedat | |
dc.contributor.author | Dursun, Ahmet Faruk | |
dc.date.accessioned | 2024-05-19T14:46:16Z | |
dc.date.available | 2024-05-19T14:46:16Z | |
dc.date.issued | 2024 | |
dc.department | İstinye Üniversitesi | en_US |
dc.description.abstract | In this article, a password-authenticated key exchange (PAKE) version of the National Institute of Standards and Technology (NIST) post-quantum cryptography (PQC) public-key encryption and key-establishment standard is constructed. We mainly focused on how the PAKE version of PQC standard Kyber with mobile compatibility can be obtained by using simple structured password components. In the design process, the conventional password-based authenticated key exchange (PAK) approach is updated under the module learning with errors (MLWE) assumptions to add passwordbased authentication. Thanks to the following PAK model, the proposed Kyber.PAKE provides explicit authentication and perfect forward secrecy (PFS). The resistance analysis against the password dictionary attack of Kyber.PAKE is examined by using random oracle model (ROM) assumptions. In the security analysis, the cumulative distribution function (CDF) Zipf (CDF-Zipf) model is also followed to provide realistic security examinations. According to the implementation results, Kyber.PAKE presents better run-time than lattice-based PAKE schemes with similar features, even if it contains complex key encapsulation mechanism (KEM) components. The comparison results show that the proposed PAKE scheme will come to the fore for the future security of mobile environments and other areas. | en_US |
dc.description.sponsorship | Estonian Research Council [PRG946]; TUBITAK [121R006] | en_US |
dc.description.sponsorship | This work was supported by the Estonian Research Council Grant no. PRG946 and TUBITAK under grant no. 121R006. The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript. | en_US |
dc.identifier.doi | 10.7717/peerj-cs.1960 | |
dc.identifier.issn | 2376-5992 | |
dc.identifier.pmid | 38660167 | en_US |
dc.identifier.uri | https://doi.org10.7717/peerj-cs.1960 | |
dc.identifier.uri | https://hdl.handle.net/20.500.12713/5485 | |
dc.identifier.volume | 10 | en_US |
dc.identifier.wos | WOS:001194917200003 | en_US |
dc.identifier.wosquality | N/A | en_US |
dc.indekslendigikaynak | Web of Science | en_US |
dc.language.iso | en | en_US |
dc.publisher | Peerj Inc | en_US |
dc.relation.ispartof | Peerj Computer Science | en_US |
dc.relation.publicationcategory | Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı | en_US |
dc.rights | info:eu-repo/semantics/openAccess | en_US |
dc.snmz | 20240519_ka | en_US |
dc.subject | Post-Quantum Cryptography | en_US |
dc.subject | Password-Based Authenticated Key Exchange | en_US |
dc.subject | Lattice-Based Cryptography | en_US |
dc.title | Password authenticated key exchange-based on Kyber for mobile devices | en_US |
dc.type | Article | en_US |