A small number of network protocols such as SSL/TLS and Kerberos are extremely widely used to protect a vast assortment of extremely valuable information. This talk will describe some systematic ways of analyzing the security of network protocols that use cryptography and discuss some example case studies. Using the methods described in this talk, groups at Stanford and elsewhere have found errors and improvements in SSL/TLS, the key management protocols for IPSEC, the 802.11i wireless authentication protocol, other wirelss protocols, and Kerberos.
This presentation is part of a multi-university NSF TRUST Center distributed lecture series.
Download slides in PDF format.
About the speaker:
John Mitchell is the Mary and Gordon Crary Family Professor in the Stanford Computer Science Department. His research in computer security focuses on trust management, distributed access control policies, and security analysis of network protocols. He has also worked on programming language analysis and design, formal methods, and other applications of mathematical logic to computer science. Prof. Mitchell is currently involved in the multi-univeristy PORTIA research project to study privacy concerns in databases and information processing systems, and the NSF TRUST Center.
Dept Computer Science