Seminar za matematičku logiku i osnove matematike
In this joint work with Cas Cremers, the first systematic analysis of the ISO/IEC 11770 standard for key management techniques is performed.
We analyse 30 security protocols and their variants from the standard with respect to their claimed security properties, as well as additional modern requirements. Our formal, tool-supported analysis of the protocols
uncovers several incorrect claims in the standard. We provide concrete suggestions for improving the standard.
[This practice talk for SSR 2014 will be presented in English, and Cas will be joining us from Oxford via Skype. Time permitting, we will follow up the talk with a brief demo of Scyther and Tamarin in Croatian.]