Some of you may be interested in attending the seminar Prof. Sivakumar.
Nagarjuna
----- Forwarded message from ASET Forum aset@tifr.res.in -----
Date: Wed, 16 Apr 2003 13:52:25 +0530 (IST) From: ASET Forum aset@tifr.res.in Subject: Next ASET talk To: Nagarjuna nagarjun@hbcse.tifr.res.in, S Ananthakrishnan ananth@ncra.tifr.res.in
Please publicise. Thanks.
With regards,
B.Satyanarayana, Coordinator, ASET Forum.
- From: ---------------------------------------------------+
| ASET Forum, TIFR, Colaba, Mumbai, INDIA, 400 005 | | Tel : +91 22 2215 2971 Ext: 2928 Fax: +91 22 2215 2110 | | Mai : aset@tifr.res.in Web: www.tifr.res.in/~aset | +----------------------------------------------------------+
Title : Cryptographic Protocols and Internet Security Speaker : Prof. G. Sivakumar, Computer Science Department Indian Institute of Technology, Mumbai siva@cse.iitb.ac.in, http://www.cse.iitb.ac.in/~siva Date : Friday, April 25, 2003 Time : 1600 hours Venue : AG-66 Abstract:
We will start with an overview of Internet security requirements (such as privacy, integrty, authenticity), threats (sniffing, spoofing, denialof services) and vulnerabilities (virus, Trojan Horse, buffer overflows). We will then separate the three main components of security--- Data security, System security and Transmission/Network Security and present useful defence mechanisms used at each layer. At the heart of most defence mechanisms are Cryptographic protocols, which are security related interactions for reaching agreement between two or more principals, for example for authentication and key distribution. Such protocols are usually described by alternate transmission and receipt of (encrypted) messages in pre-defined format and sequence between principals. We will conclude by introducing several logics that have been proposed to model cryptographic protocols and corresponding proof techniques used to prove properties of the protocol such as vulnerability to attack by interception or spoofing of messages.
----- End forwarded message -----