2016-03-10 02.00 pm s.t.
Steve Kremer Inria & Loria
CISPA 0.05

Automated verification of equivalence properties for cryptographic protocols

Steve Kremer

Inria & Loria

Title : Automated verification of equivalence properties for cryptographic protocols

Building: E9 1 (CISPA), Room 0.05, Lecture hall

Abstract

Formal, symbolic techniques for modelling and automatically analyzing security protocols are extremely successful and were able to discover
many security flaws. Initially, these techniques were mainly developed to analyze authentication and confidentiality properties. Both these
properties are trace properties and efficient tools for their verification exist. In more recent years anonymity-like properties have
received increasing interest. Many flavors of anonymity properties are naturally expressed in terms of indistinguishability and modeled as an
observational equivalence in process calculi. We will present recent advances in the verification of such indistinguishability properties and
illustrate their usefulness on examples from electronic voting and RFID protocols.

Bio