CS4615 Cryptographic Protocol Design and Attacks

Cryptographic protocols (such as key-exchange and mutual-authentication protocols) are essential to the security of all distributed computer networks. Such protocols are often simple, but they also often fall victim to various attacks, including structural attacks. This course considers the ‘protocol analysis problem': finding attacks against a protocol (if they exist) or proving their absence (if they do not). We will examine protocol design and protocol-analysis techniques, and compare their strengths and weaknesses. Advanced topics include (as time permits) protocol-design heuristics, trust-management and higher-level protocol goals, interactions between protocols, computational soundness, and decidability results.

Prerequisite

CS3600 or permission of instructor

Lecture Hours

3

Lab Hours

1

Statement Of Course Objectives

1. Understand fundamental protocol analysis options and their limitations (computational, symbolic)

2. Evaluate options used to analyze a protocol, based on the security insight needed.

3. Analyze the intended security goals of a variety of protocols

4. Create basic protocols based on a variety of goals

5. Analyze basic protocols

Course Learning Outcomes

  • Students will understand fundamental protocol analysis options and their limitations and be able to evaluate options used to analyze a protocol, based on the security insight needed.
  • Students will be able to analyze the intended security goals of a variety of protocols and provide a basic analysis.