Verification of Security Protocols Lecture 0: admin Sandro Etalle.

Slides:



Advertisements
Similar presentations
Modelling and Analysing of Security Protocol: Lecture 8 Automatically Checking Protocols II Tom Chothia CWI.
Advertisements

Verification of Security Protocols Lecture 0: admin Sandro Etalle Jerry den Hartog.
Bangalore, 2 Feb 2005Probabilistic security protocols 1 CIMPA School on Security Specification and verification of randomized security protocols Lecture.
G53SEC 1 Revision & Exam Tips G53SEC. 2 Today’s Lecture: Revision Summary + Tips Exam Tips Preliminary Coursework Feedback.
CIS101 Introduction to Computing Week 11 Spring 2004.
CS 555Topic 11 Cryptography CS 555 Topic 1: Overview of the Course & Introduction to Encryption.
Lecture 1: IntroductionIntro to IT COSC1078 Introduction to Information Technology Lecture 2 Overview James Harland
CSCE 790: Computer Network Security Chin-Tser Huang University of South Carolina.
Chapter 0 Introductory Comments. Overview Syllabus Detailed power point slides My Web Page –Homework on web page –Readings –Other.
6/19/2015 Prof. Ehud Gudes Security Ch 1 1 Chapter 0 - Overview.
December 7, 2001DIMI, Universita’ di Udine, Italy Graduate Course on Computer Security Lecture 9: Automated Verification Iliano Cervesato
Lecture 1: IntroductionIntro to IT COSC1078 Introduction to Information Technology Lecture 1 Introduction James Harland
ECE 171 first class in logic and computers Dr Marek Perkowski Introduction Grading What is this class.
Project Management Take a Tour of the Online Course.
1 ECE453 – Introduction to Computer Networks Lecture 19 – Network Security (II)
Slide 1ICT 325 Human-Computer InteractionSemester 1, 2005 ICT 325 Human-Computer Interaction Semester 2, 2005.
ECE453 – Introduction to Computer Networks Lecture 18 – Network Security (I)
Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall 1 Introduction to CPSC Introduction to CPSC Information Technology.
Computer Networks Paper Coordinator: Dr. Napoleon H. Reyes, Ph.D. Computer Science Institute of Information and Mathematical Sciences Rm
CS 458 Internet Engineering Instructor: Prof. Jörg Liebeherr University of Virginia.
Discrete Mathematics. - Coding Theory and Cryptology - Cryptographic Implementations eindhoven.cr.yp.to - Discrete Algebra and Geometry.
COEN 7501 Grading Scheme ► Exam: 40% ► Project: 60%
Lecture 1: Introduction CS 6903: Modern Cryptography Spring 2009 Nitesh Saxena Polytechnic Institute of NYU.
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
GdI/ICS 1 WS 2008/2009 Telecooperation/RBG Prof. Dr. Max Mühlhäuser, Dr. Guido Rößling, Melanie Hartmann, Daniel Schreiber.
Introduction Management 102 Jerry Estenson. Structure Blue Track Content Focus Crimson Track Content Skills Application.
1 G53ACC: Advanced Computer Communications Prof. Chris Greenhalgh School of Computer Science and IT University of Nottingham.
CS 858 – Hot Topics in Computer and Communications Security Winter 2009 Introduction.
How to Learn in This Course CS 5010 Program Design Paradigms “Bootcamp” Lesson 0.1 © Mitchell Wand, This work is licensed under a Creative Commons.
1 How Do I Do Well In 8.02? A >= 95 = 90 = 85 B = 80 = 76 =72 C = 69 = 66 = 63 D = 59 F < 59 THIS COURSE IS NOT CURVED We want you to help your.
Welcome! CSI 4118: Computer Networks and Protocols (3,0,0) Professor: Dr. Robert L. Probert Office: SITE 5098 Phone: x6709
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved Introduction.
Introduction to CMPT 281. Outline Admin information Textbooks and resources Moodle site Grading Assignments Project.
CS1001 Lecture 9. Overview Security Security HTML HTML.
CSC 450/550 Part 1: Introduction. CSC 450/550 Summary (1)Contact information (2)Course objective and topics (3)Course evaluation (4)* The layering principle.
6 June Lecture 2 1 TU Dresden - Ws on Proof Theory and Computation Formal Methods for Security Protocols Catuscia Palamidessi Penn State University,
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
Introduction to Information Security J. H. Wang Sep. 18, 2012.
ICOM 5995 (crypto) - Noack Crypto - Administrivia Prontuario - Please time-share and ask questions Info is in my homepage amadeus.uprm.edu/~noack/ Make.
COMP1927 Course Introduction 16x1
Innovative Approaches to Teaching Groups Making Theories Practical Presented by: Paul Cousins Teachers’ Workshop.
Lecture 1 Page 1 CS 236 Online Introduction CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
1 Introduction to modeling Introduction. 2 Where are we? #TitleDate 1Introduction General concepts ORM modeling Relational.
Introduction to Network Systems Security Mort Anvari.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
1 Introduction to modeling Introduction Anna Fensel
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
EOC Biology Exam OPEN RESPONSE QUESTION “How To” Sample The following is an Open Response question. It is important to practice answering these types of.
Motivating Humans Timothy A. Pychyl Department of Psychology Carleton University.
Lecture 4 1 Honnor Projects Supervised by Catuscia Palamidessi The  -calculus, a small language for specification and verification of concurrency and.
Foundation Year Routes to Success Part III - Sustaining Success Consolidation Su White, ECS Su White Semester 2 overview Resource set in Edshare
Database Management Systems, 3ed, R. Ramakrishnan and J. Gehrke1 Database architecture and security Workshop 4.
CMGT 411 Complete Class CMGT 411 Introduction to Information Systems Security Management Version 3 Check this A+ tutorial guideline at
CSCE 715: Network Systems Security
Purpose of Class To prepare students for research and advanced work in security topics To familiarize students working in other networking areas with important.
Computer Communication & Networks
Efficient CRT-Based RSA Cryptosystems
CS 336/536: Computer Network Security Fall 2015 Nitesh Saxena
Lecture 01: Introduction
Exam Preparation Spring 2017
COMP4451 Theory of Computing
CS 336/536: Computer Network Security Fall 2014 Nitesh Saxena
Pima Medical Institute Online Education
Communication Systems – 2 Digital Communications
CS 336/536: Computer Network Security Fall 2014 Nitesh Saxena
CS 336/536: Computer Network Security Fall 2015 Nitesh Saxena
Exam Preparation Spring 2018
Presentation transcript:

Verification of Security Protocols Lecture 0: admin Sandro Etalle

Before we start Check the calendar -there is a longer-than-expected carnival break (krokusvakantie in Enschede) -Possibly a Monday that becomes a Tuesday (May 29) -We have one lecture less than last year. OBLIGATORY: Enroll in OASE!!! oase.tue.nl This way I we can reach you easily.

Lecturers Sandro Etalle (theory) Mayla Bruso’ (Practice) Jerry den Hartog (theory + privacy) -In this order -We have all done at some point in time research on verification of security protocols. Slides are posted and corrected runtime

Topics (1) Block 3 Introduction and Overview. Formal Protocol Narrations: The Spi-calculus Secrecy and Secrecy Types Secrecy Types for Asymmetric Cryptography. Authenticity and Authenticity Types. ProVerif: A Resolution Prover for Protocol Verification Secrecy and Authentication Analysis of an E-voting Protocol in the Applied Pi Calculus Non-repudiation

Topics (2) Block 4 Exercises on ProVerif. Information flow Anonymity (1) Anonymity (2) Anonymity (3) Presentations (1). Presentations (2).

Locations the page contains a link to the public version of the SVN (accessible via web), which is where we are going to post the slides etc. n_security_protocols/slides/ n_security_protocols/slides/

Exam One exam with practical as well as theoretical questions Practical questions: use of proverif NO BOOK NO COMPUTER