MPI-INF Logo
Campus Event Calendar

Event Entry

What and Who

Automated verification of equivalence properties forcryptographic protocols

Steve Kremer
Inria Nancy
CISPA Distinguished Lecture Series
AG 1, AG 2, AG 3, AG 4, AG 5, SWS, RG1, MMCI  
Public Audience
English

Date, Time and Location

Thursday, 10 March 2016
14:00
60 Minutes
E9 1 - CISPA
Lecture Hall, ground floor
Saarbrücken

Abstract

Formal, symbolic techniques for modelling and automatically analyzing
security protocols are extremely successful and were able to discover
many security flaws. Initially, these techniques were mainly developed
to analyze authentication and confidentiality properties. Both these
properties are trace properties and efficient tools for their
verification exist. In more recent years anonymity-like properties have
received increasing interest. Many flavors of anonymity properties are
naturally expressed in terms of indistinguishability and modeled as an
observational equivalence in process calculi. We will present recent
advances in the verification of such indistinguishability properties and
illustrate their usefulness on examples from electronic voting and
RFID protocols.

Contact

Sabine Nermerich
0681-3023585
--email hidden
passcode not visible
logged in users only

Sabine Nermerich, 02/24/2016 10:59 -- Created document.