2022
DOI: 10.1007/978-3-031-17143-7_4
|View full text |Cite
|
Sign up to set email alerts
|

A Tale of Two Models: Formal Verification of KEMTLS via Tamarin

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 28 publications
0
0
0
Order By: Relevance
“…A significant body of research has been dedicated to the augmentation of network security infrastructure with PQC capabilities, including X.509 certificates [18][19][20][21][22], Media Access Control security (MACsec) [23], Internet Protocol Security (IPSec) [24,25], Transport Layer Security (TLS) [26][27][28][29][30][31][32][33][34][35][36], Secure Shell (SSH) [32,37], and WireGuard [38][39][40]. In addition, PQC algorithms have been implemented in devices as part of their secure boot capability [41,42].…”
Section: Device Security and Spdmmentioning
confidence: 99%
See 1 more Smart Citation
“…A significant body of research has been dedicated to the augmentation of network security infrastructure with PQC capabilities, including X.509 certificates [18][19][20][21][22], Media Access Control security (MACsec) [23], Internet Protocol Security (IPSec) [24,25], Transport Layer Security (TLS) [26][27][28][29][30][31][32][33][34][35][36], Secure Shell (SSH) [32,37], and WireGuard [38][39][40]. In addition, PQC algorithms have been implemented in devices as part of their secure boot capability [41,42].…”
Section: Device Security and Spdmmentioning
confidence: 99%
“…The first part is the traditional key ExchangeData with a fixed size, and the second part is the PQC key ExchangeData with a fixed size. The format of the PQC key ExchangeData, such as public key and cipher text, should be determined by the selected We did notice that the KEM-based authentication [61] was adopted by several standard proposals, such as WireGuard [38] and KEMTLS [27,35,36]. However, following this approach for SPDM will entail a significant impact for the SPDM KEY_EXCHANGE message flow, as well as other digital-signature-based commands such as SPDM CHALLENGE or GET_-MEASURMENT.…”
Section: Post-quantum Design For Spdm Secure Sessionmentioning
confidence: 99%