Research overview
The use of rigorous definitions and proofs is vital to provide a foundation for secure protocols. By showing that any attack on the protocol is at least as difficult as well studied hard problems we can avoid missing attacks in our analysis. These definitions and proofs are relevant in any protocol which needs clear security guarantees and particularly protocols using cryptography. These proofs can be done by hand or using computer aided analysis. The use of computer aided techniques enables proving properties not only of the protocol specification but the implementation.