Ensuring Privacy in Cryptographic Protocols: Formal Verification Techniques πŸ”

Join Ioana Boureanu at VeTSS Summer School 2024 as she explores the latest methods for formally verifying privacy in cryptographic protocols, blending theory with practical insights.

Ensuring Privacy in Cryptographic Protocols: Formal Verification Techniques πŸ”
VeTSS RI
38 views β€’ Sep 20, 2024
Ensuring Privacy in Cryptographic Protocols: Formal Verification Techniques πŸ”

About this video

Ioana Boureanu, β€œFormal Verification of Privacy in Cryptographic Protocols: Theory and Practice, Part 1”, VeTSS Summer School 2024

Talk by Ioana Boureanu, University of Surrey, at the VeTSS Summer School 2024.

In this tutorial we will try to understand why it is hard to formally verify privacy-like properties, such as strong secrecy, anonymity, unlinkability or lack of information flow, in well-established models for formal analysis of cryptographic protocols. We will then see how to do some approximations of this verification in state-of-the-art tools for what is called Dolev-Yao protocol analysis, such as Tamarin and a new tool called Phoebe. Finally, if time allows, we will touch upon on what privacy analysis may mean in the β€œsister formalisms” for proving cryptographic protocols secure or private, that is in computational models and accompanying tools such as Squirrel.

To follow the examples, you may need to have the following installed in your machine:
Haskell (https://www.haskell.org/)
Tamarin prover (https://tamarin-prover.com/), the newest version is fine.
Squirrel prover (https://squirrel-prover.github.io/)

Video Information

Views

38

Duration

01:23:05

Published

Sep 20, 2024

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.