BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Talks.cam//talks.cam.ac.uk//
X-WR-CALNAME:Talks.cam
BEGIN:VEVENT
SUMMARY:The IITM Model and its Application to the Analysis of Real-World S
 ecurity Protocol - Ralf Küsters\, University of Trier
DTSTART:20110908T123000Z
DTEND:20110908T133000Z
UID:TALK32806@talks.cam.ac.uk
CONTACT:Microsoft Research Cambridge Talks Admins
DESCRIPTION:A prevalent way in cryptography to design and analyze cryptogr
 aphic protocols in a modular way is the simulation-based approach. Higher-
 level components of a protocol are designed and analyzed based on lower-le
 vel idealized components\, called ideal functionalities. Composition theor
 ems then allow to replace the ideal functionalities by their realizations\
 , altogether resulting in a system without idealized components. \n\nIn th
 is talk\, I first provide some background on the simulation-based approach
  and then briefly introduce the Inexhaustible Interactive Turing Machine (
 IITM) model\, a model which\, compared to other models for simulation-base
 d security\, is particularly simple and expressive.  Although modularity i
 s key to tame the complexity of real-world security protocol analysis\, si
 mulation-based approaches have rarely been used to analyze such protocols.
  In the past few years\, we have developed a framework for the faithful an
 d modular analysis of real-world security protocols based on the IITM mode
 l. I will present this framework and also discuss what has hindered the us
 e of the simulation-based approach before.
LOCATION:Large lecture theatre\, Microsoft Research Ltd\, 7 J J Thomson Av
 enue (Off Madingley Road)\, Cambridge
END:VEVENT
END:VCALENDAR
