Download presentation

Presentation is loading. Please wait.

Published byUlises Redshaw Modified over 2 years ago

1
Modelling and Analysing of Security Protocol: Lecture 11 Modelling Checking Tom Chothia CWI

2
Today Model Checking is useful Probabilities can be an important part of a protocol (also next week).

3
The Rest of the Course Today: Model Checking. 26th Oct: When you have to have probability and Fair Exchange protocols (Homework due). 2nd, 9th, 16th, 23rd and 30th Nov Student presentations. E-mail me your presentation idea’s by Friday

4
Today Model Checking for finite systems Specifying properties in CTL Dinning Philosophers BREAK Probabilistic finite systems Specifying probabilistic properties in PCTL Dinning Cryptographers

5
50 BC to 1960s : Not relevant: –Pre-computer: Caesar cipher to Enigma. Keys prearranged by hand 1960s to 1980s : Not considered necessary –ARPAnet, an open network, no or little secret, e.g. telnet. open relays A Quick History of Key Establishment and Authentication

6
1970s to 1990s : First tries –Early Internet, trying for security, e.g. SSL version 1, Needham-sroder. 1980-2000s : Becomes a science –Principles for protocol design, attacker models, Kerberos, TLS, SSH 1990s to present: Automation –Understood well enough to check by machine.

7
Anonymity Protocols upto 1990s : Not relevant: –Little personal information on the Internet upto 2000s : Not considered necessary 1990 to Now: First tries, –Dinning Cryptographers, –anonymous proxies, –Tor.

8
Anonymity Protocols Only now: Becoming a Science Limited automatic checking of automata protocols –Only for finite systems, no dedicated tools

9
Model Checking Idea: –Make a model of your system with has a limited number of states –Check every single state to make sure its OK Problem: making the model finite Problem: “state space explosion” Very effective, many industrial applications

10
Model Checking 1994 Pentium chip was missing a few entries in a table. Almost never used so missed by standard testing. If x=4195835 & y =3145727 then x/y=1.333739068902037589 rather than =1.333820449136241002 But x-(x.y/y)= 256 not 0

11
Result Public relations disaster Jokes: –How many Pentium designers does it take to change a light bulb? –1.99995827903 100 of millions of dollars of replacement costs. Intel now model checks all hardware.

12
PRISM

13
Traffic Lights Example

14
State Space

15
CTL examples

16
CTL

17
CTL Derived Operators.

18
Dinning Philosophers

19
Dinning Philosophers in PRISM

20
Checking the Dinning Philosphers

21
Fixing the Deadlock

22
Today Model Checking for finite systems Specifying properties in CTL Dinning Philosophers example BREAK Probabilistic finite systems Specifying probabilistic properties in PCTL Dinning Cryptographers

Similar presentations

OK

Modelling and Analysing of Security Protocol: Lecture 12 Probabilistic Modelling Checking of Anonymous Systems Tom Chothia CWI.

Modelling and Analysing of Security Protocol: Lecture 12 Probabilistic Modelling Checking of Anonymous Systems Tom Chothia CWI.

© 2017 SlidePlayer.com Inc.

All rights reserved.

Ads by Google

Imod display ppt online Ppt on water pollution in delhi Ppt on photosynthesis and respiration Ppt on mother teresa life A ppt on natural disasters Ppt on water activity meters Ppt on eye os and od Ppt on p&g products brands list Ppt on kingdom monera phylum Ppt on places in our neighbourhood lesson