Page d'accueil IMAG

  Pascal Lafourcade

Home page

Presentation and Informations

Security models

This unit is one of the common core courses in Master SAFE. Course topics:
  • Introduction
  • Indistinguishability
  • Public Encryption
  • Symmetric encryption
  • Security protocols: Symbolic Model and Computational Model
  • Non-interference Problem
  • Access Control and Security Policies
Assitant for this lecture Mathilde Duclos

Coordonnées

Adresse 
Pascal Lafourcade
Laboratoire Verimag centre Equation
2, avenue de Vignate
38610 Gières
FRANCE
Bureau : CTL1/B4D
Tél : +33 (0) 4 56 52 04 14
Mobile : +33 (0) 6 83 54 90 70
Fax : +33 (0) 4 56 52 03 44
E-mail : pascal.lafourcade@imag.fr
Verimag Webmail Verimag Webmail Zimbra

Material

Number Date Lecture Comments C, TD, TP
1 7th November 2011 Introduction : Security Notions SET 1 C1
2 7th November 2011 Reduction proofs C2
3 8th November 2011 Public encryption, Reduction Proofs TD1
4 8th November 2011 Hybrid Argument TD2
5 8th November 2011 Protocols C3
6 9th November 2011 Tools SET 2 C4
7 9th November 2011 Cryptoverif SET Cryptoverif TP1
Fichiers
8 9th November 2011 Verification Tools and Applications SET Tools TP2
9 10th November 2011 Passive Intruder C5
10 10 th November 2011 Active Intruder C6
11 14th November 2011 Formalisation TD3
12 15th November 2011 Acces Control and Non Interference C7
13 16th November 2011 Acces Control TD4
14 16th November 2011 Others C8
15 18th November 2011 Project TP3
16 18th November 2011 Project TP4


LINK TO AVISPA-1.0 LINK TO AVISPA-1.1 Tools used: AVISPA, Hermes, Proverif, Scyther, Xor and DH Proverif.

Material for practice session in Computer Room: protocol1.spdl, protocol2.spdl, needham.horn and needham.pi

PATH variable useful for the Computer exercices session:

export AVISPA_PACKAGE=/opt/avispa/
export PATH=$PATH:$AVISPA_PACKAGE




Online References


Articles in Security


References for LaTex

List of useful material to use LaTex

If you use Linux please use Ispell to avoid typos in your file.

Books in Security

  • Two volumes of: The Foundations of Cryptography by Oded Goldreich
  • Bruce Schneier, Applied cryptography,
  • Matt Bishop, Computer Security: Art and Science,
  • Douglas Stinson, Cryptography: Theory and Practice,
  • Simon Singh, The Code Book: The Secret History of Codes and Code Breaking.
  • Christos Papadimitriou, Computational Complexity, Edition Addison Wesley, 1994.