Presentation is loading. Please wait.

Presentation is loading. Please wait.

The “Modular” Approach

Similar presentations


Presentation on theme: "The “Modular” Approach"— Presentation transcript:

1 The “Modular” Approach
Bogdan Warinschi March 6th, 2006 Formacrypt

2 Computational execution
Goal Protocols Symbolic execution model Computational execution model Security property Security property Proof methods Proof methods

3 Computational execution
Direct approach Protocols Symbolic execution model Computational execution model Security property Security property Proof methods Proof methods

4 Computational execution
Logical approach Protocols Symbolic execution model Computational execution model Security property Security property Proof methods Proof methods

5 Computational execution
The Modular Approach Protocols Symbolic execution model Computational execution model Security property Security property Proof methods Proof methods

6 Computational execution
The Modular Approach Protocols Symbolic execution model Computational execution model Faithfulness Theorem Security property Security property Soundness Theorem Proof methods Proof methods

7 Patterns/static equiv
Passive Adversaries Expressions/ frames Patterns/static equiv classes Probability distributions Faithfulness Theorem Key secrecy Pwd secrecy Security property Soundness Theorem

8 Active Adversaries PK Encryption Signatures Hashes (R.O.)
Symbolic execution Computational execution Faithfulness Theorem Trace properties Nonce secrecy Trace properties Nonce secrecy Soundness Theorem

9 Extensions Symmetric encrytion MACs Diffie Hellman No Random Oracles
PK Encryption Signatures Hashes (R.O) Symbolic execution Computational execution Faithfulness Theorem Key secrecy New properties: contract signing, pwd secrecy Trace properties Nonce secrecy Trace properties Nonce secrecy Soundness Theorem

10 Usability Protocols Symbolic execution model Computational execution
Faithfulness Theorem Security property Security property Soundness Theorem Proof methods (active & passive case)

11 Usability Security property Higher level applications Protocols
Symbolic execution model Computational execution model Faithfulness Theorem Security property Security property Soundness Theorem


Download ppt "The “Modular” Approach"

Similar presentations


Ads by Google