Download presentation

Presentation is loading. Please wait.

Published byZackery Shad Modified about 1 year ago

1
Verification of Security Protocols Lecture 0: admin Sandro Etalle Jerry den Hartog

2
Before we start Check the calendar -Some days no lecture due to vacation in Eindhoven / Twente / Nijmegen. OBLIGATORY: Enroll in OASE!!! oase.tue.nl This way I we can reach you easily.

3
Lecturers Sandro Etalle (theory) Jerry den Hartog (Practice & more theory) -In this order -We have all done at some point in time research on verification of security protocols. Slides are posted and corrected runtime

4
Topics (1) Block 3 Introduction and Overview. Formal Protocol Narrations: The Spi-calculus Secrecy and Secrecy Types Secrecy Types for Asymmetric Cryptography. Authenticity and Authenticity Types. ProVerif: A Resolution Prover for Protocol Verification Secrecy and Authentication

5
Topics (2) Block 4 Analysis of an E-voting Protocol in the Applied Pi Calculus Non-repudiation Information flow Anonymity (1) Anonymity (2)

6
Locations the page contains a link to the public version of the SVN (accessible via web), which is where we post the slides etc. https://svn.win.tue.nl/viewcvs/security_public/teaching/verificatio n_security_protocols/slides/https://svn.win.tue.nl/viewcvs/security_public/teaching/verificatio n_security_protocols/slides/

7
Assessment Assignment -Proverif, given after the corresponding lectures, hand in by last lecture Exam -One exam with practical as well as theoretical questions -Practical questions: use of proverif -NO BOOK -NO COMPUTER

Similar presentations

© 2017 SlidePlayer.com Inc.

All rights reserved.

Ads by Google