RISC Seminars (Research on Information Security and Cryptology)
Archives: [2024] [2023] [2022] [2021] [2020] [2019] [2018] [2017] [2016] [2015] [2014] [2013] [2012] [2011] [2010] [2009] [2008] [2007] [2006] [2005] [2004] [List of Speakers](To receive information about upcoming seminars, register for the RISC mailing list.)
[print]
Joint RISC/SEN2 Seminar on Cryptography and Formal Methods
Date: | October 24 |
Location: | NIKHEF, Room H220 |
Schedule: | |
13:30-13:50 | Ricardo Corin (University of Twente): Sound Computational Interpretation of Formal Encryption with Composed Keys Abstract: We relate a Dolev Yao model with a realistic computational model. In particular, we extend the original work of Abadi and Rogaway by considering encryption with composed keys as opposed to atomic keys.
|
13:50-14:00 | Break |
14:00-14:45 | Peter van Rossum (University of Nijmegen): Relations for Anyonymity Abstract: Anonymizing protocols do not try to keep the contents of messages secure, but try to hide the mere fact that communication takes place. A sufficiently capable attacker could discover this mere fact by investigation relations between otherwise random looking messages. For instance, if A sends an encrypted message m and B sends the message h(m), an eavesdropper E could infer that A and B are communicating even if E cannot discover the meaning of the message m itself. Now, proving an anonymizing protocol correct from the formal method point of view is one thing, another thing is to analyze what this correctness means for a real implementation. In an Abadi-Rogaway / Micciancio-Warischi fashion, we analyze the relation between the world of algebraic messages and the world of bit string messages, taking care of possible relations between messages in both worlds, and prove soundness and completeness of an appropriate semantic interpretation of messages.
|
14:45-15:00 | Break |
15:00-15:45 | Dennis Hofheinz (CWI): Protocol Analysis using Simulatability Abstract: This is an overview over simulatability in general, and certain pitfalls that arise with this security notion. Furthermore, some existing and potential relations to the formal methods community are sketched.
|
15:45-16:00 | Break |
16:00-16:30 | Mohammed Dashti (CWI): Wanted: Safe or Alive Abstract: I plan to talk about liveness issues in the formal verification of security protocols and a modified Dolev-Yao intruder suitable for checking them. I might also find some time to mention a couple of case studies.
|
0.05005s