How to explain security protocols to your children

Autor: Véronique Cortier, Itsaka Rakotonirina
Přispěvatelé: Proof techniques for security protocols (PESTO), Inria Nancy - Grand Est, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Department of Formal Methods (LORIA - FM), Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS), Max Planck Institute for Security and Privacy [Bochum] (MPI Security and Privacy), ANR-20-CHIA-0024,ASAP,Des outils pour la vérification symbolique automatisée de protocoles cryptographiques déployés(2020)
Jazyk: angličtina
Rok vydání: 2021
Předmět:
Zdroj: Protocols, Strands, and Logic-Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday
Protocols, Strands, and Logic-Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday, 13066, Springer, pp.112-123, 2021, LNCS, ⟨10.1007/978-3-030-91631-2_6⟩
Protocols, Strands, and Logic-Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday, 13066, Springer, pp.112-123, In press, LNCS, ⟨10.1007/978-3-030-91631-2_6⟩
Protocols, Strands, and Logic ISBN: 9783030916305
Popis: International audience; Security protocols combine two key components: a logical structure (who answers what, under which conditions?) as well as cryptography (encryption, signature, hash,. . .). It is not so easy to explain their principles and weaknesses to a non expert audience. Why is something an attack or not? For which attacker? With what purpose? In this paper, we propose an approach to introduce security protocols to a general audience, including children or even scientists from different fields. Its goal is to convey the implicit assumptions of our community, such as threat models or the participants' behaviour. This all-public introduction can be thought of as a story but, interestingly, can also be implemented physically with boxes and padlocks: manipulation helps to understand how protocols operate, even permitting non-expert participants to design their own-and thus to size the challenges of this task.
Databáze: OpenAIRE