Vous êtes ici

  1. Accueil
  2. Protocoles de sécurité (SEP)

Protocoles de sécurité (SEP)

Protocoles de sécurité (SEP)

En pratique :

Volume horaire de cours : 20
Langue principale : Anglais
Nombre de crédits européens : 3

Description du contenu de l'enseignement

The objective of this course is to provide students with an in-depth knowledge regarding methods and tools for the specification, design, and symbolic verification of security protocols in various domains.

The following topics will be covered in this course :

  • Introduction to cryptography (if necessary): symmetric and asymmetric cryptography, hash functions,
  • Formal ways of specifying a protocol: Alice & Bob notation, message sequence charts, Horn clauses, constraint systems, applied pi calculus,
  • Attacker models: passive and active attackers, Dolev-Yao adversary, knowledge inference,
  • Formal specification of security properties: weak and strong secrecy, indistinguishability property, authentication (aliveness, agreement, synchronization), anonymity,
  • Man-in-the-middle attacks,
  • Protocol verification with a bounded number of sessions: constraint systems,
  • Protocol verification with an unbounded number of sessions: Horn Clauses,
  • Symbolic versus computational models for protcol verification,
  • Tools for automatic verification of security protocols: ProVerif, Scyther, OFMC, APTE, etc…

After a successful completion of this course, the students should be able to :

  • Specify a protocol in a suitable formal framework,
  • Formally define the security property against which the protocol should be checked,
  • Select an appropriate verification tool to analyze the protocol,
  • Detect logical flaws in improperly designed or implemented protocols.