Abstract
You can now make purchases, access your accounts and even vote online. But how can we ensure that no intruder interferes with these sensitive operations? The security of such transactions is guaranteed by computer programs known as "security protocols". These protocols are based on cryptographic techniques such as encryption, electronic signature and hashing. However, cryptography alone is not enough.
Sometimes, simply swapping two messages is enough to gain illegitimate access to a service. It is therefore necessary to analyze the logical structure of protocols, combined with the cryptography used.
The formal analysis of security protocols calls on a number of verification techniques: resolution, unification, equation theory, constraint systems. The aim of this seminar is to give an overview of the techniques used and to describe how several protocols have been corrected using these analysis techniques.