Secure Messaging Cas Cremers

News

09.12.2019

Today's Seminar Venue: Room 3.08

Dear all,

 

Today's seminar is held in Room 3.08.

 

Best,

Mang

04.12.2019

Schedule for the next year

Dear all,

 

Below you can see the schedule of our seminars for the next year.

As discussed in the seminar on 02. Dec., the seminars on 20.Jan., 27.Jan., 03.Feb. will start one hour earlier, i.e. at 13:15.

 

Please let me know if this plan causes any... Read more

Dear all,

 

Below you can see the schedule of our seminars for the next year.

As discussed in the seminar on 02. Dec., the seminars on 20.Jan., 27.Jan., 03.Feb. will start one hour earlier, i.e. at 13:15.

 

Please let me know if this plan causes any inconvenience to you.

 

Best,

Mang

 

 

Date Matr-Nr. Topic
06.Jan. 2558537 The Double Ratchet: Security Notions, Proofs, and Modularization for the Signal Protocol
13.Jan. 2551318 Asymmetric Group Key Agreement
20.Jan. 2553798 Multi-party Off-the-Record Messaging
2570192 On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees
27.Jan. 2581749 Message Franking via Committing Authenticated Encryption
2568983 SEEMless: Secure End-to-End Encrypted Messaging with less Trust
03.Feb. 2568342 Co-ordinating Developers and High-Risk Users of Privacy-Enhanced Secure Messaging Protocols
2572739 A Formal Security Analysis of the Signal Messaging Protocol

 

02.12.2019

Seminar on 09. and 16. December

Dear all,

 

The topic of the seminar on 09. December is about the paper "Deniable Key Exchange for Secure Messaging".

And the seminar on 16. December is canceled.

 

Best,

Mang

26.11.2019

Reminder: Practice makes Perfect

Dear all,

 

This is just one reminder: Practice makes Perfect!

 

Nobody is born gifted, and every talent requires practice and refining. The speech skill is not an exception.

So, to give a nice presentation, we suggest you giving some test-talks, in... Read more

Dear all,

 

This is just one reminder: Practice makes Perfect!

 

Nobody is born gifted, and every talent requires practice and refining. The speech skill is not an exception.

So, to give a nice presentation, we suggest you giving some test-talks, in particular in front of your friends, before you give the final talk in the seminar.

 

Best,

Mang

 

08.11.2019

Paper Assignment && LSF Registration

Dear all,

 

Thanks for sending us your preferences.

We have sent the final assignment to each of you. You can also check the table below (Please let me know if anything is wrong).

 

Paper Assignment
Matr-Nr. Paper
... Read more

Dear all,

 

Thanks for sending us your preferences.

We have sent the final assignment to each of you. You can also check the table below (Please let me know if anything is wrong).

 

Paper Assignment
Matr-Nr. Paper
2575877 Post-Compromise Security
2576746 Off-the-Record Communication, or, Why Not To Use PGP
2553798 Multi-party Off-the-Record Messaging
2551318 Asymmetric Group Key Agreement
2572828 Deniable Key Exchanges for Secure Messaging
2572739 A Formal Security Analysis of the Signal Messaging Protocol
2581749 Message Franking via Committing Authenticated Encryption
2570192 On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees
2568342 Co-ordinating Developers and High-Risk Users of Privacy-Enhanced Secure Messaging Protocols
2558537 The Double Ratchet: Security Notions, Proofs, and Modularization for the Signal Protocol
2568983 SEEMless: Secure End-to-End Encrypted Messaging with less Trust

 

Please note:

1. The first presentation shall be given on 18. November about the topic "Post-Compromise Security", and the second presentation shall be given on 02. December about the topic "Off-the-Record Communication, or, Why Not To Use PGP". Please let me know if this arrangement causes any inconvenience to both speakers.

 

2. The registration in LSF is open now and until 28. November. You MUST register in LSF for the final grade.

 

3. The order of these papers does NOT imply the order of the presentations. We will reorder these papers for your better understanding of secure messaging. Therefore, please start to read your assigned paper as early as possible and don't hesitate to post questions in the forum! We will announce the final order of the presentations as soon as possible.

 

 

Best,

 

Mang

 

 

05.11.2019

Please choose the top3 papers that you prefer to present

Dear all,

We have uploaded the 2nd - 12th paper to CMS (Path: Information -> Materials).

They are:

2. Off-the-Record Communication, or, Why Not To Use PGP 
3. Post-Compromise Security
4. The Double Ratchet: Security Notions, Proofs, and Modularization for... Read more

Dear all,

We have uploaded the 2nd - 12th paper to CMS (Path: Information -> Materials).

They are:

2. Off-the-Record Communication, or, Why Not To Use PGP 
3. Post-Compromise Security
4. The Double Ratchet: Security Notions, Proofs, and Modularization for the Signal Protocol
5. On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees
6. Asymmetric Group Key Agreement
7. Message Franking via Committing Authenticated Encryption
8. Deniable Key Exchanges for Secure Messaging
9. Multi-party Off-the-Record Messaging
10. Co-ordinating Developers and High-Risk Users of Privacy-Enhanced Secure Messaging Protocols
11. A Formal Security Analysis of the Signal Messaging Protocol
12. SEEMless: Secure End-to-End Encrypted Messaging with less Trust

 

Please send me three your preferred papers (and rank them in order) by the end of tomorrow (06. Nov. 2019), via email: mang.zhao@cispa.saarland

We will try our best to distribute them well to meet your preferences.

To anyone who doesn't send me your preferences, we will assign the most "unattractive" paper. :- )

 

Best,

Mang

30.10.2019

Seminar Time-Slot and Location

Dear all,

Thanks for voting the time-slots in Doodle.

According to most people's preference, we decide on the time-slot for this seminar: 14:15 - 16:00 s.t. every Monday. (Location: Room 0.01 E 9.1 CISPA Building)

If you cannot make it, please send us one... Read more

Dear all,

Thanks for voting the time-slots in Doodle.

According to most people's preference, we decide on the time-slot for this seminar: 14:15 - 16:00 s.t. every Monday. (Location: Room 0.01 E 9.1 CISPA Building)

If you cannot make it, please send us one email for deregistration so that we could arrange for other candidates to join this seminar.

 

Moreover, please note that there are two exceptions:

1. The seminar on 11. November is cancelled.

2. On 18. November, the venue is Room 3.08, E 9.1, CIPSA Building.

 

Best,

Mang

28.10.2019

Please fill out the doodle for seminar slots

Dear all,

Please fill out the below doodle by the end of Tuesday (before Wednesday):

https://doodle.com/poll/226hxe5k6szu6u4p

Best,

Cas

 

 

23.10.2019

Kick-off meeting

The Kick-off meeting for this course will be on Monday October 28, 14:00 c.t., in room 3.08 in the CISPA building.

 

Show all
 

How Secure is Messaging?

Provable Guarantees for Secure Messaging

Description: Nearly everyone uses a messaging app, many of which claim that they offer secure messaging. However, it is not always exactly clear what this exactly means. When is a messaging app secure? How do we know it is secure? Can we prove anything about their security? The focus on this course is on modern ways to mathematically specify what various levels of messaging security actually mean, and the methodologies that can be used to prove that this is indeed the case. This will give both a good insight in the state-of-the-art as well as the scientific questions that are still unanswered.

Every week, one student will present her/his assigned papers on a certain topic, followed by a group discussion. All students are required to read the papers carefully and prepare a list of questions for discussion. Each student will write a summary of her/his assigned papers providing a general overview of the field.

Requirements: Students must have basic knowledge about cryptography and protocols (e.g., through Foundations of Cybersecurity I and II) and basic knowledge about either: verification, cryptography, computational logic or concurrent systems (e.g., through the respective lectures).



Privacy Policy | Legal Notice
If you encounter technical problems, please contact the administrators