Formal methods for protocols Cryptographic models Passive case Active case
Verification of Security Protocols Part II
V´ eronique Cortier1 September, 2010
Fosad 2010
1LORIA, CNRS 1/76 V´ eronique Cortier Verification of Security Protocols
Verification of Security Protocols Part II eronique Cortier 1 V - - PowerPoint PPT Presentation
Formal methods for protocols Cryptographic models Passive case Active case Verification of Security Protocols Part II eronique Cortier 1 V September, 2010 Fosad 2010 1 LORIA, CNRS 1/76 V eronique Cortier Verification of Security
Formal methods for protocols Cryptographic models Passive case Active case
1LORIA, CNRS 1/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case
2/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case
3/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case
4/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Yesterday course Adding equational theories
5/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Yesterday course Adding equational theories
6/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Yesterday course Adding equational theories
6/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Yesterday course Adding equational theories
6/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Yesterday course Adding equational theories
7/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Yesterday course Adding equational theories
8/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Yesterday course Adding equational theories
9/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Yesterday course Adding equational theories
10/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Yesterday course Adding equational theories
11/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Yesterday course Adding equational theories
12/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Yesterday course Adding equational theories
12/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Yesterday course Adding equational theories
13/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Yesterday course Adding equational theories
14/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Yesterday course Adding equational theories
15/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Yesterday course Adding equational theories
16/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Encryption schemes Security of encryption Cryptographic models Linking formal and cryptographic models
17/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Encryption schemes Security of encryption Cryptographic models Linking formal and cryptographic models
18/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Encryption schemes Security of encryption Cryptographic models Linking formal and cryptographic models
18/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Encryption schemes Security of encryption Cryptographic models Linking formal and cryptographic models
19/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Encryption schemes Security of encryption Cryptographic models Linking formal and cryptographic models
20/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Encryption schemes Security of encryption Cryptographic models Linking formal and cryptographic models
20/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Encryption schemes Security of encryption Cryptographic models Linking formal and cryptographic models
20/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Encryption schemes Security of encryption Cryptographic models Linking formal and cryptographic models
21/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Encryption schemes Security of encryption Cryptographic models Linking formal and cryptographic models
22/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Encryption schemes Security of encryption Cryptographic models Linking formal and cryptographic models
23/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Encryption schemes Security of encryption Cryptographic models Linking formal and cryptographic models
23/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Encryption schemes Security of encryption Cryptographic models Linking formal and cryptographic models
24/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Encryption schemes Security of encryption Cryptographic models Linking formal and cryptographic models
24/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Encryption schemes Security of encryption Cryptographic models Linking formal and cryptographic models
25/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Encryption schemes Security of encryption Cryptographic models Linking formal and cryptographic models
25/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Encryption schemes Security of encryption Cryptographic models Linking formal and cryptographic models
1 Hypothesis : The algorithmic problem P is hard = there is no
26/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Encryption schemes Security of encryption Cryptographic models Linking formal and cryptographic models
1 Hypothesis : The algorithmic problem P is hard = there is no
2 Reduction :
26/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Encryption schemes Security of encryption Cryptographic models Linking formal and cryptographic models
1 Hypothesis : The algorithmic problem P is hard = there is no
2 Reduction :
3 Conclusion : the encryption scheme is secure, there is no
26/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Encryption schemes Security of encryption Cryptographic models Linking formal and cryptographic models
27/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Encryption schemes Security of encryption Cryptographic models Linking formal and cryptographic models
28/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Encryption schemes Security of encryption Cryptographic models Linking formal and cryptographic models
28/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Encryption schemes Security of encryption Cryptographic models Linking formal and cryptographic models
29/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Encryption schemes Security of encryption Cryptographic models Linking formal and cryptographic models
29/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Encryption schemes Security of encryption Cryptographic models Linking formal and cryptographic models
1 the adversary A1 is given the public key pk.
30/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Encryption schemes Security of encryption Cryptographic models Linking formal and cryptographic models
1 the adversary A1 is given the public key pk. 2 The adversary A1 chooses two messages m0, m1.
30/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Encryption schemes Security of encryption Cryptographic models Linking formal and cryptographic models
1 the adversary A1 is given the public key pk. 2 The adversary A1 chooses two messages m0, m1. 3 one bit b = 0, 1 is flipped and c = E(mb; r) is given to the
30/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Encryption schemes Security of encryption Cryptographic models Linking formal and cryptographic models
1 the adversary A1 is given the public key pk. 2 The adversary A1 chooses two messages m0, m1. 3 one bit b = 0, 1 is flipped and c = E(mb; r) is given to the
4 The adversary A2 outputs b′.
30/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Encryption schemes Security of encryption Cryptographic models Linking formal and cryptographic models
1 the adversary A1 is given the public key pk. 2 The adversary A1 chooses two messages m0, m1. 3 one bit b = 0, 1 is flipped and c = E(mb; r) is given to the
4 The adversary A2 outputs b′.
30/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Encryption schemes Security of encryption Cryptographic models Linking formal and cryptographic models
31/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Encryption schemes Security of encryption Cryptographic models Linking formal and cryptographic models
1 The adversary A1 is given the public key pk.
32/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Encryption schemes Security of encryption Cryptographic models Linking formal and cryptographic models
1 The adversary A1 is given the public key pk. 2 The adversary A1 chooses a set of messages M.
32/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Encryption schemes Security of encryption Cryptographic models Linking formal and cryptographic models
1 The adversary A1 is given the public key pk. 2 The adversary A1 chooses a set of messages M. 3 Two messages m and m∗ are chosen at random in M and
32/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Encryption schemes Security of encryption Cryptographic models Linking formal and cryptographic models
1 The adversary A1 is given the public key pk. 2 The adversary A1 chooses a set of messages M. 3 Two messages m and m∗ are chosen at random in M and
4 The adversary A2 outputs a binary relation R and a
32/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Encryption schemes Security of encryption Cryptographic models Linking formal and cryptographic models
33/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Encryption schemes Security of encryption Cryptographic models Linking formal and cryptographic models
33/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Encryption schemes Security of encryption Cryptographic models Linking formal and cryptographic models
33/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Encryption schemes Security of encryption Cryptographic models Linking formal and cryptographic models
34/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Encryption schemes Security of encryption Cryptographic models Linking formal and cryptographic models
35/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Encryption schemes Security of encryption Cryptographic models Linking formal and cryptographic models
35/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Encryption schemes Security of encryption Cryptographic models Linking formal and cryptographic models
35/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Encryption schemes Security of encryption Cryptographic models Linking formal and cryptographic models
36/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Encryption schemes Security of encryption Cryptographic models Linking formal and cryptographic models
37/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Encryption schemes Security of encryption Cryptographic models Linking formal and cryptographic models
38/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Encryption schemes Security of encryption Cryptographic models Linking formal and cryptographic models
39/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Encryption schemes Security of encryption Cryptographic models Linking formal and cryptographic models
40/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Encryption schemes Security of encryption Cryptographic models Linking formal and cryptographic models
40/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Encryption schemes Security of encryption Cryptographic models Linking formal and cryptographic models
41/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Encryption schemes Security of encryption Cryptographic models Linking formal and cryptographic models
1 Assume that some algorithmic problem P is difficult (E.g. RSA
2 Suppose that a (polynomial probabilistic) adversary A breaks
42/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Encryption schemes Security of encryption Cryptographic models Linking formal and cryptographic models
1 Assume that some algorithmic problem P is difficult (E.g. RSA
2 Suppose that a (polynomial probabilistic) adversary A breaks
3 Build out of A an adversary B that solves P. 42/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Encryption schemes Security of encryption Cryptographic models Linking formal and cryptographic models
1 Assume that some algorithmic problem P is difficult (E.g. RSA
2 Suppose that a (polynomial probabilistic) adversary A breaks
3 Build out of A an adversary B that solves P. 4 Conclude that the protocol is secure provided P is difficult. 42/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Encryption schemes Security of encryption Cryptographic models Linking formal and cryptographic models
43/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Encryption schemes Security of encryption Cryptographic models Linking formal and cryptographic models
44/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Encryption schemes Security of encryption Cryptographic models Linking formal and cryptographic models
44/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Encryption schemes Security of encryption Cryptographic models Linking formal and cryptographic models
Ideal protocol protocol Implemented
Formal approach: verification encryption algorithm algorithm signature Cryptographers: verification
45/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Patterns Soundness of indistinguishability
46/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Patterns Soundness of indistinguishability
47/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Patterns Soundness of indistinguishability
48/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Patterns Soundness of indistinguishability
48/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Patterns Soundness of indistinguishability
48/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Patterns Soundness of indistinguishability
48/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Patterns Soundness of indistinguishability
48/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Patterns Soundness of indistinguishability
49/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Patterns Soundness of indistinguishability
49/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Patterns Soundness of indistinguishability
49/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Patterns Soundness of indistinguishability
49/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Patterns Soundness of indistinguishability
50/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Patterns Soundness of indistinguishability
51/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Patterns Soundness of indistinguishability
51/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Patterns Soundness of indistinguishability
51/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Patterns Soundness of indistinguishability
51/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Patterns Soundness of indistinguishability
52/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Patterns Soundness of indistinguishability
52/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Patterns Soundness of indistinguishability
52/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Patterns Soundness of indistinguishability
52/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Patterns Soundness of indistinguishability
52/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Patterns Soundness of indistinguishability
53/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Patterns Soundness of indistinguishability
1 By the lemma, we have [
2 Then Pat(S1) ≡ Pat(S2) implies [
53/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Patterns Soundness of indistinguishability
54/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Patterns Soundness of indistinguishability
54/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Patterns Soundness of indistinguishability
54/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Patterns Soundness of indistinguishability
54/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Patterns Soundness of indistinguishability
55/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Patterns Soundness of indistinguishability
56/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Patterns Soundness of indistinguishability
56/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Patterns Soundness of indistinguishability
56/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Patterns Soundness of indistinguishability
57/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Patterns Soundness of indistinguishability
1 How to adapt the definition of patterns for encryption
2 How to adapt the definition of patterns for encryption
3 How to adapt the definition of patterns for asymmetric
58/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Trace mapping A special case : computational secrecy General computational indistinguishability
59/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Trace mapping A special case : computational secrecy General computational indistinguishability
60/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Trace mapping A special case : computational secrecy General computational indistinguishability
ek(b)
ek(b)
sk(b)
sk(b)
61/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Trace mapping A special case : computational secrecy General computational indistinguishability
62/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Trace mapping A special case : computational secrecy General computational indistinguishability
62/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Trace mapping A special case : computational secrecy General computational indistinguishability
62/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Trace mapping A special case : computational secrecy General computational indistinguishability
skip the proof 63/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Trace mapping A special case : computational secrecy General computational indistinguishability
64/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Trace mapping A special case : computational secrecy General computational indistinguishability
64/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Trace mapping A special case : computational secrecy General computational indistinguishability
65/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Trace mapping A special case : computational secrecy General computational indistinguishability
65/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Trace mapping A special case : computational secrecy General computational indistinguishability
65/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Trace mapping A special case : computational secrecy General computational indistinguishability
65/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Trace mapping A special case : computational secrecy General computational indistinguishability
66/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Trace mapping A special case : computational secrecy General computational indistinguishability
66/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Trace mapping A special case : computational secrecy General computational indistinguishability
67/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Trace mapping A special case : computational secrecy General computational indistinguishability
68/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Trace mapping A special case : computational secrecy General computational indistinguishability
1 Design of a new formal secrecy property 2 Proof of its soundness and its faithfulness w.r.t.
3 NP-completeness of the secrecy property 68/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Trace mapping A special case : computational secrecy General computational indistinguishability
69/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Trace mapping A special case : computational secrecy General computational indistinguishability
69/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Trace mapping A special case : computational secrecy General computational indistinguishability
69/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Trace mapping A special case : computational secrecy General computational indistinguishability
69/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Trace mapping A special case : computational secrecy General computational indistinguishability
69/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Trace mapping A special case : computational secrecy General computational indistinguishability
70/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Trace mapping A special case : computational secrecy General computational indistinguishability
70/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Trace mapping A special case : computational secrecy General computational indistinguishability
71/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Trace mapping A special case : computational secrecy General computational indistinguishability
72/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Trace mapping A special case : computational secrecy General computational indistinguishability
72/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Trace mapping A special case : computational secrecy General computational indistinguishability
73/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Trace mapping A special case : computational secrecy General computational indistinguishability
73/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Trace mapping A special case : computational secrecy General computational indistinguishability
74/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Trace mapping A special case : computational secrecy General computational indistinguishability
75/76 V´ eronique Cortier Verification of Security Protocols
Formal methods for protocols Cryptographic models Passive case Active case Setting Trace mapping A special case : computational secrecy General computational indistinguishability
76/76 V´ eronique Cortier Verification of Security Protocols