MPI-INF Logo
Campus Event Calendar

Event Entry

New for: D2, D3

What and Who

Composable Protocols for the Cloud

Sebastian Gajek
Tel Aviv University
Talk
AG 1, AG 3, AG 5, SWS, AG 2, AG 4, RG1, MMCI  
AG Audience
English

Date, Time and Location

Thursday, 9 June 2011
09:00
45 Minutes
E1 4
019
Saarbrücken

Abstract

Designing and analyzing systems in a “modular” way has contributed to fundamental achievements in many realms of computer science and related fields. In contrast, building provably secure systems (i.e.systems whose security properties are defined in a mathematical model)in a composable way is subject to recent research in the security and cryptography community.


In the first part of the talk, we motivate and present a framework for the modular design and analysis of protocols for Cloud applications.Clouds are highly complex systems. Numerous cryptographic modules run in concurrent processes and interact with other, non-cryptographic parts (e.g., caches, browsers, policy enforcers, users) of the system.

A major problem here is scalability because the analytical complexity linearly grows with the number of modules. A natural approach to coping with the blow up is automation and mechanization. Composability allows applying the automated tool only to small components while still obtaining a global security guarantee.

In the second part of talk, we choose from the framework a cryptographic module, the Diffie-Hellman key exchange, and automatically assert security properties of the single-session key exchange protocol while deducing the security of the composite,multi-session system. Specifically, we show how to automatically assert forward secrecy under fully adaptive party corruptions, while maintaining both composability and cryptographic soundness.

Contact

gk-sek
--email hidden

Video Broadcast

Yes
Kaiserslautern
passcode not visible
logged in users only

gk-sek, 06/03/2011 13:07 -- Created document.