196 research outputs found
The Chronicle [March 4, 2002]
The Chronicle, March 4, 2002https://repository.stcloudstate.edu/chron/4533/thumbnail.jp
A comprehensive, formal and automated analysis of the EDHOC protocol
International audienceEDHOC is a key exchange proposed by IETF's Lightweight Authenticated Key Exchange (LAKE) Working Group (WG). Its design focuses on small message sizes to be suitable for constrained IoT communication technologies. In this paper we provide an in-depth formal analysis of EDHOC-draft version 12, taking into account the different proposed authentication methods and various options. For our analysis we use the SAPIC + protocol platform that allows to compile a single specification to 3 state-of-the-art protocol verification tools (PROVERIF, TAMARIN and DEEPSEC) and take advantage of the strengths of each of the tools. In our analysis we consider a large variety of compromise scenarios, and also exploit recent results that allow to model existing weaknesses in cryptographic primitives, relaxing the perfect cryptography assumption, common in symbolic analysis. While our analysis confirmed security for the most basic threat models, a number of weaknesses were uncovered in the current design when more advanced threat models were taken into account. These weaknesses have been acknowledged by the LAKE WG and the mitigations we propose (and prove secure) have been included in version 14 of the draft
Awards and Special Recognitions Committee 1997-1998
The records of the Administrative Staff Council (UA-022) are available in print in the Center for Archival Collections
The Ithacan, 2001-03-01
https://digitalcommons.ithaca.edu/ithacan_2000-01/1020/thumbnail.jp
Central Florida Future, Vol. 38 No. 64, April 27, 2006
https://stars.library.ucf.edu/centralfloridafuture/2903/thumbnail.jp
Principles of Security and Trust
This open access book constitutes the proceedings of the 8th International Conference on Principles of Security and Trust, POST 2019, which took place in Prague, Czech Republic, in April 2019, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2019. The 10 papers presented in this volume were carefully reviewed and selected from 27 submissions. They deal with theoretical and foundational aspects of security and trust, including on new theoretical results, practical applications of existing foundational ideas, and innovative approaches stimulated by pressing practical problems
The Chronicle [April 17, 2000]
The Chronicle, April 17, 2000https://repository.stcloudstate.edu/chron/4435/thumbnail.jp
- …