FORMAL METHODS IN CRYPTOGRAPHIC PROTOCOL ANALYSIS: EMERGING ISSUES AND TRENDS Catherine Meadows Center for High Assurance Computer Systems Naval Research.

Slides:



Advertisements
Similar presentations
Smart Certificates: Extending X.509 for Secure Attribute Service on the Web October 1999 Joon S. Park, Ph.D. Center for Computer High Assurance Systems.
Advertisements

Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
1 TOWARDS A HIERARCHY OF CRYPTOGRAPHIC PROTOCOL MODELS Catherine Meadows, NRL Joint work with Chris Lynch, Clarkson/NRL.
Special systems: MLS Multilevel security [“Red book” US-DOD 1987] Considers the assurance risk when composing multilevel secure systems evaluated under.
Identity Federation Rules and Process Linda Elliott President, PingID Network Electronic Authentication Partnership Washington, DC February 12, 2004.
SSA’s Electronic Information Data Exchange Information Security Certification and Compliance Monitoring Program Presented by: Michael G. Johnson, Director,
CHAPTER 8: SECURITY IN COMPUTER NETWORKS Encryption Encryption Authentication Authentication Security Security Secure Sockets Layer Secure.
Cyber and Maritime Infrastructure
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Issues of Security and Privacy in Networking in the CBA Karen Sollins Laboratory for Computer Science July 17, 2002.
COEN 351: E-Commerce Security Public Key Infrastructure Assessment and Accreditation.
CONTEXT BINDING: An Emerging Problem in Cryptographic Protocols Catherine Meadows Naval Research Laboratory Code 5543 Washington, DC 20375
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Project supported by YESS 2009 Young Engineering Scientist Symposium « Identity Management » Cryptography for the Security of Embedded Systems Ambient.
Ashok Gulati Chair Professor for Agriculture Indian Council for Research on International Economic Relations (ICRIER) Panel Discussion at the seminar on.
Solving Challenges Others Cannot Economic Development Policy Trends Christopher D. Lloyd September 24, 2008.
Data/Analysis Challenges in the Electronic Business Environment Dr. Howard Frank Dean Robert H. Smith School of Business University of Maryland College.
ECMM 6000, Fall 2004 Intro 1 Overview of Electronic Commerce Technology Issues 1.Networking 2.Web programming 3.Cryptography 4.Other topics Introduction.
Pushing the Security Boundaries of Ubiquitous Computing ACSF 2006 —————— 13 th July 2006 —————— David Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob Askwith.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
PHDSC session Readiness of public health information systems to support Meaningful Use of EHRs through health information exchanges.
computer
A Holistic Security Architecture for Distributed Information Systems – A Categorical Approach.
CSCE 813 Internet Security Cryptographic Protocol Analysis.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #22 Secure Web Information.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #2 Information Security August 24, 2005.
Ruth Pordes November 2004TeraGrid GIG Site Review1 TeraGrid and Open Science Grid Ruth Pordes, Fermilab representing the Open Science.
Solving Challenges Others Cannot Economic Development Trends Christopher D. Lloyd March 23, 2008.
1 Using Common Criteria Protection Profiles. 2 o A statement of user need –What the user wants to accomplish –A primary audience: mission/business owner.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
Protocol Analysis. CSCE Farkas 2 Cryptographic Protocols Two or more parties Communication over insecure network Cryptography used to achieve goal.
Solving Challenges Others Cannot Economic Development Policy Trends Christopher D. Lloyd June 18, 2008.
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
E-Government in Public Libraries American Library Association Annual Conference Washington DC Nancy Fredericks, E-Government Services Manager Pasco County.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
Henric Johnson1 Chapter 7 WEB Security Henric Johnson Blekinge Institute of Technology, Sweden
Data and Applications Security
Team 1 – Incident Response
The Demand for Audit and Other Assurance Services
OGSA Data Architecture WG Data Transfer Discussion
Lecture 5. Security Threats
Data and Applications Security
Security Protocols Analysis
Single Window Rec 33 - Technology Corner
Topic 1: Data, information, knowledge and processing
Moving Companies in VA Moving Companies in Washington DC.
GeoMesh Blockchain Networking - Slide Presentation
Internet of Things: Security Challenges
Data/Analysis Challenges in the Electronic Business Environment
Shadow: Scalable and Deterministic Network Experimentation
Data/Analysis Challenges in the Electronic Business Environment
این دوره شامل: تعریف مذاکره کلمات کلیدی ورودی ها انواع مذاکره
Washington Conference
Session 1.6a: PRESENTATION
On Public Regulation vs. Self Regulation of E-commerce:
Reading: ‘Washington, DC’
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security
Data and Applications Security
No Course Title ECTS 1. International Military Relations 5 ECTS 2.
Tim Polk, NIST PKI Program Manager March 2000
Data and Applications Security
Presentation transcript:

FORMAL METHODS IN CRYPTOGRAPHIC PROTOCOL ANALYSIS: EMERGING ISSUES AND TRENDS Catherine Meadows Center for High Assurance Computer Systems Naval Research Laboratory Washington, DC

Emerging Properties of Protocols Greater interoperation –Meta protocols to negotiate agreement upon protocols, eg. ISAKMP-IKE Negotiation of policy –Security associations –Certificate hierarchies Greater complexity –Especially for electronic commerce Group-oriented protocols Emerging security threats –Denial of service –Traffic analysis

ISSUES AND OPEN PROBLEMS 1.Composability 2.Incremental Analysis 3.Probabalistic and Game-Theoretic Analysis 4.High Fidelity 5.Open-Ended and Group Protocols 6.Transaction Processing 7.Getting it into the Real World