Sommaire

  • Cet exposé a été présenté le 07 avril 2006.

Description

  • Orateur

    Mathieu Baudet - ENS Cachan

Designing secure protocols based on passwords is a difficult task. Indeed, passwords, and more generally low-entropy secrets, are potentially vulnerable to guessing attacks, that is, exhaustive, "brute force" searches. Preventing guessing attacks typically requires a protocol to conceal any partial information on the password (e.g. its checksum) which could help the attacker confirm his guess during the searching process.<br/> Ensuring such a property is not obvious. Based on the seminal work of Lowe, several models and automatic tools have been proposed to analyze protocols with respect to guessing attacks. Unfortunately, these works rely on different symbolic models for which no computational justifications exist so far. (That is, a protocol may be secure in a symbolic model, and yet a feasible attack exists.) In this talk, we will study a recent, symbolic definition of security against guessing attacks, based on static equivalence. First, we will present a decision procedure for a large class of protocols, for a finite number of sessions. Then, we will provide a computational justification in the case of a passive adversary, that is, a pure eavesdropper. [This part is a joint work with M. Abadi and B. Warinschi.]

Prochains exposés

  • Journées C2: pas de séminaire

    • 03 avril 2026 (13:45 - 14:45)

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

  • Endomorphisms via Splittings

    • 10 avril 2026 (13:45 - 14:45)

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Orateur : Min-Yi Shen - No Affiliation

    One of the fundamental hardness assumptions underlying isogeny-based cryptography is the problem of finding a non-trivial endomorphism of a given supersingular elliptic curve. In this talk, we show that the problem is related to the problem of finding a splitting of a principally polarised superspecial abelian surface. In particular, we provide formal security reductions and a proof-of-concept[…]
    • Cryptography

Voir les exposés passés