Prof. Dr.-Ing. Volker Roth
This seminar focuses on cryptographic protocols and spans topics such as: sources for vulnerabilities in cryptographic protocols, logics for authentication, formal models for cryptographic protocol security, tool support for the formal specification and verification of cryptographic protocols, tool support for obtaining assurance of formal specification and implementation correspondence, and specific protocols and their implementations. Depending on students' interests, a variety of concrete protocols may be investigated, including protocols for electronic voting, authentication and session key establishment, name service security, Internet Protocol security, routing security, device pairing, multiparty computations, privacy preserving communication, and proofs of storage.
Participants should have attended the Cryptography and Networked Systems Security Course, or have comparable knowledge of cryptography schemes. Literature references will be provided during the seminar meetings. This is a so-called "Blockseminar", i.e., the students research their assigned topics independently throughout the semester. At the end of the semester, all seminar participants assemble for a day of seminar presentations.
Students are expected to:
Students will be graded on their preparedness for discussion, their presentations and their seminar report. The report must be typeset in LaTeX. Both the LaTeX source and the PDF generated from it must be submitted as a ZIP archive with the following contents:
If multiple students jointly write and submit a report then the directory shall be named first_last_first_last. The following template shall be used to typeset the technical report.
The seminar report must contain references to all the articles that were used. Each literature entry must include a brief and concise summary of the article's contribution and the contribution's benefits. Please use the BibTeX "note" field for this purpose.
All seminar participants must perform a thorough search for scientific literature on their chosen topics. At least the following sources must be searched for relevant literature:
It is imperative that students follow literature references backwards (to identify seminal and foundational papers on their subject i.e., the first ones to report results on the topic under consideration) and forward (using the cited-by features of digital libraries, or Web searches for the current paper's title) to identify the most recent work on the topic under consideration.
Note that newsticker articles or Wikipedia articles do not count as scientific literature.
A list of topics and supporting references are here. A useful resource for protocol descriptions is SPORE.
This meeting serves as an introduction to the seminar.