RISC Seminars (Research on Information Security and Cryptology)

     Archives: [2024] [2023] [2022] [2021] [2020] [2019] [2018] [2017] [2016] [2015] [2014] [2013] [2012] [2011] [2010] [2009] [2008] [2007] [2006] [2005] [2004] [List of Speakers]
(To receive information about upcoming seminars, register for the RISC mailing list.)
[print]
Joint RISC/SEN2 Seminar on Cryptography and Formal Methods
Date:October 24
Location:NIKHEF, Room H220
Schedule: 
13:30-13:50Ricardo Corin (University of Twente):
Sound Computational Interpretation of Formal Encryption with Composed Keys
Abstract: We relate a Dolev Yao model with a realistic computational model. In particular, we extend the original work of Abadi and Rogaway by considering encryption with composed keys as opposed to atomic keys.
13:50-14:00Break
14:00-14:45Peter van Rossum (University of Nijmegen):
Relations for Anyonymity
Abstract: Anonymizing protocols do not try to keep the contents of messages secure, but try to hide the mere fact that communication takes place. A sufficiently capable attacker could discover this mere fact by investigation relations between otherwise random looking messages. For instance, if A sends an encrypted message m and B sends the message h(m), an eavesdropper E could infer that A and B are communicating even if E cannot discover the meaning of the message m itself. Now, proving an anonymizing protocol correct from the formal method point of view is one thing, another thing is to analyze what this correctness means for a real implementation. In an Abadi-Rogaway / Micciancio-Warischi fashion, we analyze the relation between the world of algebraic messages and the world of bit string messages, taking care of possible relations between messages in both worlds, and prove soundness and completeness of an appropriate semantic interpretation of messages.
14:45-15:00Break
15:00-15:45Dennis Hofheinz (CWI):
Protocol Analysis using Simulatability
Abstract: This is an overview over simulatability in general, and certain pitfalls that arise with this security notion. Furthermore, some existing and potential relations to the formal methods community are sketched.
15:45-16:00Break
16:00-16:30Mohammed Dashti (CWI):
Wanted: Safe or Alive
Abstract: I plan to talk about liveness issues in the formal verification of security protocols and a modified Dolev-Yao intruder suitable for checking them. I might also find some time to mention a couple of case studies.
0.05005s