So wait, NDSS accepted and published an entire new VPN protocol with no security analysis?
-- it provides the first computational confirmations, as well as pointing to the need to improve the computational proof toolkit to handle new Noise-based protocols. Hopefully it will be motivation for people to further develop ACCE model into something nicer and more complete.
-
-
I’d be happy to hash that out with
@CasCremers. Would be a good panel topic! I think symbolic proofs aren’t sufficient. But to actually back this up I’m curious if there are any examples (even contrived ones) where a broken protocol survives one analysis but not the other. -
Symbolic models may have advanced considerably since you last looked at what kind of reasoning they're capable of. Either way, this "symbolic vs computational" battle seems to be one of those hot and contested issues. I'd enjoy listening to that panel discussion.
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.