|COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring.|
The IITM Model and its Application to the Analysis of Real-World Security Protocol
If you have a question about this talk, please contact Microsoft Research Cambridge Talks Admins.
This event may be recorded and made available internally or externally via http://research.microsoft.com. Microsoft will own the copyright of any recordings made. If you do not wish to have your image/voice recorded please consider this before attending
A prevalent way in cryptography to design and analyze cryptographic protocols in a modular way is the simulation-based approach. Higher-level components of a protocol are designed and analyzed based on lower-level idealized components, called ideal functionalities. Composition theorems then allow to replace the ideal functionalities by their realizations, altogether resulting in a system without idealized components.
In this talk, I first provide some background on the simulation-based approach and then briefly introduce the Inexhaustible Interactive Turing Machine (IITM) model, a model which, compared to other models for simulation-based security, is particularly simple and expressive. Although modularity is key to tame the complexity of real-world security protocol analysis, simulation-based approaches have rarely been used to analyze such protocols. In the past few years, we have developed a framework for the faithful and modular analysis of real-world security protocols based on the IITM model. I will present this framework and also discuss what has hindered the use of the simulation-based approach before.
This talk is part of the Microsoft Research Cambridge, public talks series.
This talk is included in these lists:
Note that ex-directory lists are not shown.
Other listsFrom Genotype to Phenotype: Resources and Challenges (10th June 2009, Hinxton) Cambridge Carbon Footprint VHI Seminars
Other talksPredictive coding in the brain in health and disease - how intracranial EEG helps validate non-invasive in vivo methods Temporal dynamics of post-retrieval amnesia for learned fear Making, breaking and directing polarity during neural lumen formation and neurogenesis in the zebrafish embryo INTERGENERATIONAL ENGAGEMENT IN THE MIDDLE EAST AND NORTH AFRICA Symmetries and Noether's Theorem 97 years on Exploring the structural basis of DNA repair and RNA degradation by the PI3K-like kinases (PIKKs) using EM