Download presentation
Presentation is loading. Please wait.
Published byAlberta Austin Modified over 9 years ago
1
Verification of Security Protocols Lecture 0: admin Sandro Etalle
2
Before we start Check the calendar -there is a longer-than-expected carnival break (krokusvakantie in Enschede) -Possibly a Monday that becomes a Tuesday (May 29) -We have one lecture less than last year. OBLIGATORY: Enroll in OASE!!! oase.tue.nl This way I we can reach you easily.
3
Lecturers Sandro Etalle (theory) Mayla Bruso’ (Practice) Jerry den Hartog (theory + privacy) -In this order -We have all done at some point in time research on verification of security protocols. Slides are posted and corrected runtime
4
Topics (1) Block 3 Introduction and Overview. Formal Protocol Narrations: The Spi-calculus Secrecy and Secrecy Types Secrecy Types for Asymmetric Cryptography. Authenticity and Authenticity Types. ProVerif: A Resolution Prover for Protocol Verification Secrecy and Authentication Analysis of an E-voting Protocol in the Applied Pi Calculus Non-repudiation
5
Topics (2) Block 4 Exercises on ProVerif. Information flow Anonymity (1) Anonymity (2) Anonymity (3) Presentations (1). Presentations (2).
6
Locations http://www.win.tue.nl/~jhartog/CourseVerif/ the page contains a link to the public version of the SVN (accessible via web), which is where we are going to post the slides etc. https://svn.win.tue.nl/viewcvs/security_public/teaching/verificatio n_security_protocols/slides/https://svn.win.tue.nl/viewcvs/security_public/teaching/verificatio n_security_protocols/slides/
7
Exam One exam with practical as well as theoretical questions Practical questions: use of proverif NO BOOK NO COMPUTER
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.