|COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring.|
A Proposed Framework for Analysing Security Ceremonies
If you have a question about this talk, please contact William Denman.
The concept of ceremony as an extension to network and security protocols was introduced by Ellison. No methods or tools to check correctness or the properties in such ceremonies are currently available. The applications for security ceremonies are vast and ll gaps left by strong assumptions in security protocols, like provisioning of cryptographic keys or correct human interaction. Moreover, no tools are available to check how knowledge is distributed among human peers and in their interaction with other humans and computers in these scenarios. The key component in this paper is the formalisation of human knowledge distribution in security ceremonies. By properly enlisting human expectations and interactions in security protocols, we can minimise the ill-described assumptions we usually see failing. Taking such issues into account when designing or verifying protocols can help us to better understand where protocols are more prone to break due to human constraints.
This talk is part of the Computer Laboratory Automated Reasoning Group Lunches series.
This talk is included in these lists:
Note that ex-directory lists are not shown.
Other listsRethinking the Crisis - The case for a Pluralist approach to Economics Clinical ID talks Festival of Ideas
Other talksCambridge Assessment Network: Validity Unpacked Data Structures for Efficient Inference and Optimization in Expressive Continuous Domains “Variability in Psychological Reactivity: Vulnerability, Differential Susceptibility, or Vantage Sensitivity?” The Legitimacy of "Chinese Philosophy" (中国哲学的合法性问题) Plan Bee: Ensuring the Future of Pollination Geometric Mechanics & Symmetry: From Finite to Infinite Dimensions short course - day 3