Reiner Dojen obtained his Bachelor of Engineering in Germany. This was followed with his Master of Engineering and PhD from the University of Limerick, where he is now teaching for over 15 years. He was introduced to cyber security as part of his Bachelor final year project and has been fascinated by its evolution ever since.
His research interest currently focusses on the development and verification of cryptographic security protocols and automated reasoning.
Research contributions to-date include verification of various cryptographic protocols, discovery of hitherto unknown protocol flaws and development of novel techniques and tools for the automated verification of cryptographic protocols. Reiner has published over 50 papers in various aspects of cyber security.
Abstract: Verification of Cryptographic Protocols
The security of electronic networks and information systems is a critical issue for the use of new technologies in all fields of life – particularly, as nowadays mobile and fixed networks are trusted with highly sensitive information. Thus, cryptographic protocols are required to ensure the security of both the infrastructure itself and the information that runs through it. These security protocols can be thought of as the keystones of any security architecture.
Cryptographic protocols are vulnerable to a host of subtle attacks, such as freshness attacks, interleaved session attacks and man-in-middle attacks. However, the design of cryptographic protocols immune to such attack is a highly complex and error-prone process. This is particularly evident from the surprisingly large number of published protocols, which have later been found to contain various flaws, in many cases several years after the original publication. The cost of errors or weaknesses in security systems can be very expensive, with an accompanying loss of confidence by the users of the system.
It has been shown that the use of informal or intuitive methods is insufficient to ensure the correctness of security protocols. Formal verification centred development processes for security protocols must be used to reveal any potential exploitable weaknesses in a systematic and thorough way. Thus, the risk of using faulty protocols is significantly reduced and the confidence in the security of the designed protocol is greatly increased.
This presentation will introduce security protocols and their verification. By way of case-studies, a close look will be taken at the reasons why security protocols may fail. Also, techniques and tools that enable protocol developers (or users of protocols) to detect such protocol failures will be discussed.
TEDx brings together bright minds to give idea-focused talks that range from a wide scope of subjects, which foster learning, inspiration and provoke impactful conversations. Read More >>
Congratulations to the new members of Upsilon Pi Epsilon (UPE)Read More >>