Download presentation
Presentation is loading. Please wait.
Published byZackery Shad Modified over 9 years ago
1
Verification of Security Protocols Lecture 0: admin Sandro Etalle Jerry den Hartog
2
Before we start Check the calendar -Some days no lecture due to vacation in Eindhoven / Twente / Nijmegen. OBLIGATORY: Enroll in OASE!!! oase.tue.nl This way I we can reach you easily.
3
Lecturers Sandro Etalle (theory) Jerry den Hartog (Practice & more theory) -In this order -We have all done at some point in time research on verification of security protocols. Slides are posted and corrected runtime
4
Topics (1) Block 3 Introduction and Overview. Formal Protocol Narrations: The Spi-calculus Secrecy and Secrecy Types Secrecy Types for Asymmetric Cryptography. Authenticity and Authenticity Types. ProVerif: A Resolution Prover for Protocol Verification Secrecy and Authentication
5
Topics (2) Block 4 Analysis of an E-voting Protocol in the Applied Pi Calculus Non-repudiation Information flow Anonymity (1) Anonymity (2)
6
Locations http://www.win.tue.nl/~jhartog/CourseVerif/ the page contains a link to the public version of the SVN (accessible via web), which is where we post the slides etc. https://svn.win.tue.nl/viewcvs/security_public/teaching/verificatio n_security_protocols/slides/https://svn.win.tue.nl/viewcvs/security_public/teaching/verificatio n_security_protocols/slides/
7
Assessment Assignment -Proverif, given after the corresponding lectures, hand in by last lecture Exam -One exam with practical as well as theoretical questions -Practical questions: use of proverif -NO BOOK -NO COMPUTER
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.