SLIDE 1 Scyther
Semantics and Verification
Cas Cremers
SLIDE 2
Insecure networks and communication
Arie Beppie Bank ATM machine Mobile phone Mobile phone
SLIDE 3
Insecure networks and communication
How can we ensure that communication over an insecure network is secure ? Answer: by using security protocols.
Arie Beppie Bank ATM machine Mobile phone Mobile phone Insecure networks
SLIDE 4 Security protocols and encryption
- Security protocols use of a mathematical
mechanism called encryption to make information unreadable.
- An encrypted message can only be opened by
someone who has the right key.
- This is similar to a bike lock.
SLIDE 5 Information security is more than just encryption
encryption is used, a security protocol can still be insecure.
- I will give an overview
- f the thesis by
comparing the topics with bikes and locks.
SLIDE 6 Chapter 2 : Operational semantics
– a way to connect the chain to the bike and lock
– bike thieves
In order to assess the (in)security of a system we need to define precisely what we mean by... The meaning of the concepts is defined precisely in terms of a mathematical model.
SLIDE 7 Chapter 3 : Security properties
- complete bike remains as it is
- bike frame cannot be stolen
- bike saddle cannot be stolen
What do we mean by secure? Some examples: Security requirements for security protocols are defined precisely in the model.
SLIDE 8
Chapter 4 : Verification
Starting from the mathematical model, we develop the Scyther tool in Chapter 4.
Description of a security protocol with security requirements.
Secure Insecure
attack example
Scyther
SLIDE 9
Method 1:
Bike chain around rack and front wheel. If everybody does this, a thief can't steal a whole bike, and bike away! Chapter 5 : Multi-protocol attacks What happens when you combine several security protocols?
SLIDE 10
Method 2:
Chapter 5 : Multi-protocol attacks What happens when you combine several security protocols? Bike chain around rack and frame. If everybody does this, a thief can't steal a whole bike, and bike away!
SLIDE 11
Method 1: Method 2:
If people mix the methods, a thief can steal a whole bike! Conclusion: mixing several correct (secure) security protocols together can be incorrect (insecure)! Chapter 5 : Multi-protocol attacks What happens when you combine several security protocols?
SLIDE 12
Chapter 6 : Multi-party authentication We design a (family of) new multi-party security protocols. Going out with a group of friends. Simple method: everybody uses his own lock. This requires as many locks as there are bikes. Can we do better? Design a way to use as few locks as possible for any number of bikes.
SLIDE 13 Conclusions
- We develop a new model to reason about
security protocols and their properties.
– New properties defined. – Theoretical results about model and properties.
- We develop the Scyther tool based on the
model.
- Application of the model and tool on case
studies.
– Discovery of new attacks. – Development of new multi-party protocols.