Projet ACI Sécurité Informatique : 2003 - 2006 Rapport

نویسنده

  • D. Lugiez
چکیده

1 General Description ACI Rossignol is composed of teams from LIF (UMR 6166), LSV (UMR 8643 CNRS ENS Cachan and INRIA Futurs-project SECSI), INRIA Futurs (project Comète) and Verimag (UMR 9939). The Rossignol project aims at investigating issues involved in the verification of cryptographic protocols. The focus has been put on research directions that go beyond the classical approach devised for far, known as the Dolev-Yao model, which has been extensively studied in the last years. The contributions of the project cover the following topics : – Extensions of the Dolev-Yao model that retains the basics of this formalization, but modify the model of the insecure environment (which we refer below as the intruder capabilities) to reflect more closely the real world. This can be done by adding or modifying axioms that express the properties of the operations used by the protocols or to express weak secret that can be broken by guessing attacks. – To deal with other security properties than secrecy or authentication, like anonymity or opacity that are used for instance in e-voting protocols. – Models of probabilistic protocols in a variant of π-calculus and testing the model against real protocols. To devise sound and convincing models for this class of processes is a difficult task that leads to subtle errors when this is not handled properly. – Relationship between the formal world and the computational world. While the formal approach leads to a clean trace semantics and automated verification, the approach is questionned by the computational community. Therefore works linking the two approaches provide a better understanding of the issue and can make the formal approach more convincing.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

ACI-Rossignol : Rapport d’Activité

ACI Rossignol is composed of teams from LIF (UMR 6166), LSV (UMR 8643), INRIA Futurs (Projet Comète and projet SECSI) and Verimag (UMR 9939). The research topic of the action is ccryptographic protocol verification. Two general meetings have been held and additional meetings between sites have been organized. Futhermore the action has organized a Spring School on formal aspects on Security (Sec...

متن کامل

Rapport final du projet “ Réseaux Quantiques ” de l ’ ACI “ Sécurité Informatique ”

1 Summary of Achievements The aim of this project was to develop tools and algorithms for use in quantum networks. We have divided our efforts into three broad categories: • Protection of quantum information and error correcting codes • Quantum routing and quantum walks • Other algorithms adapted to quantum networks We are happy to report that we have been able to contribute to all three of our...

متن کامل

CHASSIS — Une Plate - forme pour la Construction de Systèmes d ’ Information

Les systèmes d’information d’aujourd’hui ont de plus en plus la nécessité d’être ouverts. Ceci implique qu’ils doivent répondre aux besoins de réseaux ouverts, de logiciel et de matériel hétérogènes et “inter-opérables,” et, surtout, à des besoins évolutifs et changeants. Le projet CHASSIS vise le développement d’un cadre informatique et méthodologique pour (i) la conception et la construction ...

متن کامل

Utilisation de métadonnées pour l'aide à l'interprétation de classes et de partitions

* INRIA Rocquencourt (Projet AxIS) Domaine de Voluceau Rocquencourt, B.P. 105, F-78153 Le Chesnay Cedex, France {abdourahamane.balde, yves.lechevallier}@inria.fr ** INRIA Sophia Antipolis (Projet AxIS) Route des Lucioles, B.P. 93, F-06902 Sophia Antipolis Cedex, France [email protected] ***Supélec Plateau du Moulon Service Informatique F-91192 Gif-sur-Yvette Cedex marie-aude.aufaure@sup...

متن کامل

Rapport à mi - parcours du projet “ Réseaux Quantiques ” de l ’ ACI “ Sécurité Informatique ”

1 Summary of Achievements The aim of this project is to develop tools and algorithms for use in quantum networks. We have divided our efforts into three broad categories: • Protection of quantum information and error correcting codes • Quantum routing and quantum walks • Other algorithms adapted to quantum networks We are happy to report that we have been able to contribute to all three of our ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006