Ensuring Privacy in Cryptographic Protocols: Formal Verification Techniques π
Join Ioana Boureanu at VeTSS Summer School 2024 as she explores the latest methods for formally verifying privacy in cryptographic protocols, blending theory with practical insights.

VeTSS RI
38 views β’ Sep 20, 2024

About this video
Ioana Boureanu, βFormal Verification of Privacy in Cryptographic Protocols: Theory and Practice, Part 1β, VeTSS Summer School 2024
Talk by Ioana Boureanu, University of Surrey, at the VeTSS Summer School 2024.
In this tutorial we will try to understand why it is hard to formally verify privacy-like properties, such as strong secrecy, anonymity, unlinkability or lack of information flow, in well-established models for formal analysis of cryptographic protocols. We will then see how to do some approximations of this verification in state-of-the-art tools for what is called Dolev-Yao protocol analysis, such as Tamarin and a new tool called Phoebe. Finally, if time allows, we will touch upon on what privacy analysis may mean in the βsister formalismsβ for proving cryptographic protocols secure or private, that is in computational models and accompanying tools such as Squirrel.
To follow the examples, you may need to have the following installed in your machine:
Haskell (https://www.haskell.org/)
Tamarin prover (https://tamarin-prover.com/), the newest version is fine.
Squirrel prover (https://squirrel-prover.github.io/)
Talk by Ioana Boureanu, University of Surrey, at the VeTSS Summer School 2024.
In this tutorial we will try to understand why it is hard to formally verify privacy-like properties, such as strong secrecy, anonymity, unlinkability or lack of information flow, in well-established models for formal analysis of cryptographic protocols. We will then see how to do some approximations of this verification in state-of-the-art tools for what is called Dolev-Yao protocol analysis, such as Tamarin and a new tool called Phoebe. Finally, if time allows, we will touch upon on what privacy analysis may mean in the βsister formalismsβ for proving cryptographic protocols secure or private, that is in computational models and accompanying tools such as Squirrel.
To follow the examples, you may need to have the following installed in your machine:
Haskell (https://www.haskell.org/)
Tamarin prover (https://tamarin-prover.com/), the newest version is fine.
Squirrel prover (https://squirrel-prover.github.io/)
Video Information
Views
38
Duration
01:23:05
Published
Sep 20, 2024
Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.