Annual Computer Security Applications Conference 2021
DOI: 10.1145/3485832.3485885
|View full text |Cite
|
Sign up to set email alerts
|

A formal analysis of IKEv2’s post-quantum extension

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 28 publications
0
1
0
Order By: Relevance
“…Some related work can be found for the symbolic security analysis of protocols with quantum features. For example, the authors of Gazdag et al (2021) built a model of IKEv2 on a classical setting and then perform some analysis on it for seven properties, all of it using the Tamarin prover. With this first symbolic analysis, they prove their model to be correct and corroborate previous results by other authors.…”
Section: Related Workmentioning
confidence: 99%
“…Some related work can be found for the symbolic security analysis of protocols with quantum features. For example, the authors of Gazdag et al (2021) built a model of IKEv2 on a classical setting and then perform some analysis on it for seven properties, all of it using the Tamarin prover. With this first symbolic analysis, they prove their model to be correct and corroborate previous results by other authors.…”
Section: Related Workmentioning
confidence: 99%
“…Additionally, focusing on embedding post-quantum secure algorithms in other security protocols residing in lower network architecture levels, such as the IPsec, is also an interesting research area (see, e.g., [29] ). More generally, focusing on post-quantum solutions in several existing protocols and infrastructures, such as the blockchain ecosystem [30] , becomes an essential issue in ensuring the appropriate safeguards for long-term data protection.…”
Section: Conclusion and Future Researchmentioning
confidence: 99%