Download presentation
Presentation is loading. Please wait.
1
The “Modular” Approach
Bogdan Warinschi March 6th, 2006 Formacrypt
2
Computational execution
Goal Protocols Symbolic execution model Computational execution model Security property Security property Proof methods Proof methods
3
Computational execution
Direct approach Protocols Symbolic execution model Computational execution model Security property Security property Proof methods Proof methods
4
Computational execution
Logical approach Protocols Symbolic execution model Computational execution model Security property Security property Proof methods Proof methods
5
Computational execution
The Modular Approach Protocols Symbolic execution model Computational execution model Security property Security property Proof methods Proof methods
6
Computational execution
The Modular Approach Protocols Symbolic execution model Computational execution model Faithfulness Theorem Security property Security property Soundness Theorem Proof methods Proof methods
7
Patterns/static equiv
Passive Adversaries Expressions/ frames Patterns/static equiv classes Probability distributions Faithfulness Theorem Key secrecy Pwd secrecy Security property Soundness Theorem
8
Active Adversaries PK Encryption Signatures Hashes (R.O.)
Symbolic execution Computational execution Faithfulness Theorem Trace properties Nonce secrecy Trace properties Nonce secrecy Soundness Theorem
9
Extensions Symmetric encrytion MACs Diffie Hellman No Random Oracles
PK Encryption Signatures Hashes (R.O) Symbolic execution Computational execution Faithfulness Theorem Key secrecy New properties: contract signing, pwd secrecy Trace properties Nonce secrecy Trace properties Nonce secrecy Soundness Theorem
10
Usability Protocols Symbolic execution model Computational execution
Faithfulness Theorem Security property Security property Soundness Theorem Proof methods (active & passive case)
11
Usability Security property Higher level applications Protocols
Symbolic execution model Computational execution model Faithfulness Theorem Security property Security property Soundness Theorem
Similar presentations
© 2025 SlidePlayer.com Inc.
All rights reserved.