Verifying Classic McEliece: Examining the Role of Formal Methods in Post-Quantum Cryptography Standardisation

被引:0
|
作者
Brain, Martin [3 ]
Cid, Carlos [2 ,4 ]
Player, Rachel [1 ]
Robson, Wrenna [1 ]
机构
[1] Royal Holloway Univ London, Egham, Surrey, England
[2] Simula UiB, Bergen, Norway
[3] Univ London, Northampton Sq, London, England
[4] Grad Univ, Okinawa Inst Sci & Technol, Okinawa, Japan
来源
关键词
D O I
10.1007/978-3-031-29689-5_2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Developers of computer-aided cryptographic tools are optimistic that formal methods will become a vital part of developing new cryptographic systems. We study the use of such tools to specify and verify the implementation of Classic McEliece, one of the code-based cryptography candidates in the fourth round of the NIST Post-Quantum standardisation Process. From our case study we draw conclusions about the practical applicability of these methods to the development of novel cryptography.
引用
收藏
页码:21 / 36
页数:16
相关论文
共 50 条
  • [41] On Feasibility of Post-Quantum Cryptography on Small Devices
    Malina, Lukas
    Popelova, Lucie
    Dzurenda, Petr
    Hajny, Jan
    Martinasek, Zdenek
    [J]. IFAC PAPERSONLINE, 2018, 51 (06): : 462 - 467
  • [42] LETTERS FOR POST-QUANTUM CRYPTOGRAPHY STANDARD EVALUATION
    Ding, Jintai
    Mesnager, Sihem
    Wang, Lih-Chung
    [J]. ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2020, 14 (01) : I - I
  • [43] Post-quantum cryptography: lattice identification schemes
    Silva, Rosemberg
    Cayrel, Pierre-Louis
    Buchmann, Johannes
    [J]. PUBLICATIONES MATHEMATICAE-DEBRECEN, 2011, 79 (3-4): : 729 - 748
  • [44] Improving the Efficiency of Multiagent Information Security Systems by Post-Quantum Cryptography Methods
    Bezzateev, S. V.
    Fomicheva, S. G.
    Suprun, A. F.
    [J]. AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2023, 57 (08) : 1005 - 1017
  • [45] Improving the Efficiency of Multiagent Information Security Systems by Post-Quantum Cryptography Methods
    S. V. Bezzateev
    S. G. Fomicheva
    A. F. Suprun
    [J]. Automatic Control and Computer Sciences, 2023, 57 : 1005 - 1017
  • [46] Experimental authentication of quantum key distribution with post-quantum cryptography
    Wang, Liu-Jun
    Zhang, Kai-Yi
    Wang, Jia-Yong
    Cheng, Jie
    Yang, Yong-Hua
    Tang, Shi-Biao
    Yan, Di
    Tang, Yan-Lin
    Liu, Zhen
    Yu, Yu
    Zhang, Qiang
    Pan, Jian-Wei
    [J]. NPJ QUANTUM INFORMATION, 2021, 7 (01)
  • [47] McEliece and Niederreiter Cryptosystems Analysis in the Context of Post-Quantum Network Security
    Vambol, Aleksei
    Potii, Olexandr
    Kharchenko, Vyacheslav
    Bardis, Nikolaos
    [J]. 2017 FOURTH INTERNATIONAL CONFERENCE ON MATHEMATICS AND COMPUTERS IN SCIENCES AND IN INDUSTRY (MCSI), 2017, : 134 - 137
  • [48] A Survey of Post-Quantum Cryptography: Start of a New Race
    Dam, Duc-Thuan
    Tran, Thai-Ha
    Hoang, Van-Phuc
    Pham, Cong-Kha
    Hoang, Trong-Thuc
    [J]. CRYPTOGRAPHY, 2023, 7 (03)
  • [49] Network coding-based post-quantum cryptography
    Cohen A.
    D’Oliveira R.G.L.
    Salamatian S.
    Médard M.
    [J]. IEEE Journal on Selected Areas in Information Theory, 2021, 2 (01): : 49 - 64
  • [50] Post-quantum Cryptography: Code-Based Signatures
    Cayrel, Pierre-Louis
    Meziani, Mohammed
    [J]. ADVANCES IN COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2010, 6059 : 82 - 99