The Coinductive Approach to Verifying Cryptographic Protocols
Jesse Hughes joint work with Martijn Warnier
jesseh@cs.kun.nl
University of Nijmegen
The Coinductive Approach to Verifying Cryptographic Protocols – p.1/27
The Coinductive Approach to Verifying Cryptographic Protocols Jesse - - PowerPoint PPT Presentation
The Coinductive Approach to Verifying Cryptographic Protocols Jesse Hughes joint work with Martijn Warnier jesseh@cs.kun.nl University of Nijmegen The Coinductive Approach to Verifying Cryptographic Protocols p.1/27 Outline I.
Jesse Hughes joint work with Martijn Warnier
jesseh@cs.kun.nl
University of Nijmegen
The Coinductive Approach to Verifying Cryptographic Protocols – p.1/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.2/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.2/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.2/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.2/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.2/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.2/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.2/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.2/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.2/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.2/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.2/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.2/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.3/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.4/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.4/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.4/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.4/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.4/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.4/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.5/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.5/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.5/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.5/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.5/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.5/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.5/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.5/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.5/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.5/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.5/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.6/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.6/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.6/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.6/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.6/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.6/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.6/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.6/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.6/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.6/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.6/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.6/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.6/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.6/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.6/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.7/27
i
The Coinductive Approach to Verifying Cryptographic Protocols – p.8/27
i
The Coinductive Approach to Verifying Cryptographic Protocols – p.8/27
−1
SET be given. An F-algebra is a set A
The Coinductive Approach to Verifying Cryptographic Protocols – p.8/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.8/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.9/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.9/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.9/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.9/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.9/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.9/27
X
The Coinductive Approach to Verifying Cryptographic Protocols – p.10/27
X
The Coinductive Approach to Verifying Cryptographic Protocols – p.10/27
X
i FiX X
The Coinductive Approach to Verifying Cryptographic Protocols – p.10/27
X
i FiX X
FiX
The Coinductive Approach to Verifying Cryptographic Protocols – p.10/27
X
i FiX X
FiX
i FiX
The Coinductive Approach to Verifying Cryptographic Protocols – p.10/27
Z × X ∅ infinite streams
The Coinductive Approach to Verifying Cryptographic Protocols – p.11/27
Z × X ∅ infinite streams 1 + Z × X finite streams finite and infinite streams
The Coinductive Approach to Verifying Cryptographic Protocols – p.11/27
Z × X ∅ infinite streams 1 + Z × X finite streams finite and infinite streams 1 + X × X finite trees finite and infinite trees
The Coinductive Approach to Verifying Cryptographic Protocols – p.11/27
Z × X ∅ infinite streams 1 + Z × X finite streams finite and infinite streams 1 + X × X finite trees finite and infinite trees PωX finite, arb. branching trees Kripke frame
The Coinductive Approach to Verifying Cryptographic Protocols – p.11/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.12/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.12/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.12/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.12/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.12/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.12/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.12/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.12/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.12/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.12/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.12/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.12/27
P
The Coinductive Approach to Verifying Cryptographic Protocols – p.13/27
P
The Coinductive Approach to Verifying Cryptographic Protocols – p.13/27
P
The Coinductive Approach to Verifying Cryptographic Protocols – p.13/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.13/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.13/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.13/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.13/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.13/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.13/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.13/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.13/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.13/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.13/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.13/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.13/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.14/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.14/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.14/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.14/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.14/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.14/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.15/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.16/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.16/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.16/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.16/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.16/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.17/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.17/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.17/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.17/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.17/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.17/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.17/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.17/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.17/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.18/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.18/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.18/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.18/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.18/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.18/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.18/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.18/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.18/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.18/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.18/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.19/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.19/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.19/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.19/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.19/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.20/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.21/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.21/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.21/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.21/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.21/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.21/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.21/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.22/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.22/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.22/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.22/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.22/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.22/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.22/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.22/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.22/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.23/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.23/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.23/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.23/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.23/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.23/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.23/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.24/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.24/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.24/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.24/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.24/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.24/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.24/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.24/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.25/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.25/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.25/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.25/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.25/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.25/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.25/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.26/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.26/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.26/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.26/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.26/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.26/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.27/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.27/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.27/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.27/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.27/27
The Coinductive Approach to Verifying Cryptographic Protocols – p.27/27