Verification of Security Protocols Lecture 0: admin Sandro Etalle
Before we start Check the calendar -there is a longer-than-expected carnival break (krokusvakantie in Enschede) -Possibly a Monday that becomes a Tuesday (May 29) -We have one lecture less than last year. OBLIGATORY: Enroll in OASE!!! oase.tue.nl This way I we can reach you easily.
Lecturers Sandro Etalle (theory) Mayla Bruso’ (Practice) Jerry den Hartog (theory + privacy) -In this order -We have all done at some point in time research on verification of security protocols. Slides are posted and corrected runtime
Topics (1) Block 3 Introduction and Overview. Formal Protocol Narrations: The Spi-calculus Secrecy and Secrecy Types Secrecy Types for Asymmetric Cryptography. Authenticity and Authenticity Types. ProVerif: A Resolution Prover for Protocol Verification Secrecy and Authentication Analysis of an E-voting Protocol in the Applied Pi Calculus Non-repudiation
Topics (2) Block 4 Exercises on ProVerif. Information flow Anonymity (1) Anonymity (2) Anonymity (3) Presentations (1). Presentations (2).
Locations the page contains a link to the public version of the SVN (accessible via web), which is where we are going to post the slides etc. n_security_protocols/slides/ n_security_protocols/slides/
Exam One exam with practical as well as theoretical questions Practical questions: use of proverif NO BOOK NO COMPUTER