Campus Event Calendar

Event Entry

New for: D2, D3

What and Who

Composable Protocols for the Cloud

Sebastian Gajek
Tel Aviv University
AG 1, AG 3, AG 5, SWS, AG 2, AG 4, RG1, MMCI  
AG Audience

Date, Time and Location

Thursday, 9 June 2011
45 Minutes
E1 4


Designing and analyzing systems in a “modular” way has contributed to fundamental achievements in many realms of computer science and related fields. In contrast, building provably secure systems ( whose security properties are defined in a mathematical model)in a composable way is subject to recent research in the security and cryptography community.

In the first part of the talk, we motivate and present a framework for the modular design and analysis of protocols for Cloud applications.Clouds are highly complex systems. Numerous cryptographic modules run in concurrent processes and interact with other, non-cryptographic parts (e.g., caches, browsers, policy enforcers, users) of the system.

A major problem here is scalability because the analytical complexity linearly grows with the number of modules. A natural approach to coping with the blow up is automation and mechanization. Composability allows applying the automated tool only to small components while still obtaining a global security guarantee.

In the second part of talk, we choose from the framework a cryptographic module, the Diffie-Hellman key exchange, and automatically assert security properties of the single-session key exchange protocol while deducing the security of the composite,multi-session system. Specifically, we show how to automatically assert forward secrecy under fully adaptive party corruptions, while maintaining both composability and cryptographic soundness.


--email hidden

Video Broadcast

passcode not visible
logged in users only

gk-sek, 06/03/2011 01:07 PM -- Created document.