Home
Course description
Lecture notes
Assignments
Projects
Tools
Reference
|
CS 395T - Design and Analysis of Security Protocols (54302)
Fall 2004
Lecture notes
-
Course outline. Needham-Schroeder public-key protocol.
Introduction to Murphi.
[PDF]
-
SSL/TLS case study.
[PDF]
-
Overview of IP security. Internet Key Exchange (IKE)
protocol and predecessors.
[PDF]
-
Introduction to process algebra. Modeling security
protocols in process calculi.
[PDF]
-
Just Fast Keying (JFK) protocol.
[PDF]
-
Security as observational equivalence.
JFK protocol in applied pi calculus.
[PDF]
-
Protocols for anonymity.
[PDF]
-
Probabilistic model checking.
[PDF]
-
Probabilistic contract signing.
[PDF]
-
Compositional protocol logic.
[PDF]
-
Inductive method. Analyzing SET with the inductive method.
[PDF]
-
Symbolic constraint solving for security protocols.
[PDF]
-
Formal definitions of security for symmetric ciphers.
[PDF]
-
Formal model for secure key exchange.
Simulatability-based proofs of protocol security.
[PDF]
-
Probabilistic polynomial-time process calculus.
[PDF]
-
Computational soundness of formal models.
[PDF]
-
Fair exchange and contract signing protocols.
[PDF]
-
Game-based verification of contract signing protocols.
[PDF]
-
Universal composability framework (presented by Glen Nuckolls).
[PDF]
Student projects
Student presentations
|