|Date:||Friday 10th May (Trinity Term 2019)|
|Location:||Tony Hoare Room, Robert Hooke Building|
The design of security protocols is typically approached as an art, rather than a science, and often with disastrous consequences. But this need not be so! I have been working for ca. 20 years on foundations, methods, and tools, both for developing protocols that are correct by construction and for the post-hoc verification of existing designs. In this talk I will introduce my work in this area and describe my experience analyzing, improving, and contributing to different industry standards, both existing and upcoming. As case studies, I will discuss the ISO/IEC 9798 entity authentication standard and 5G Authentication and Key Agreement.Find out more...