Trusted computing technology, which is already present in many recently manufactured PCs, has the potential to revolutionise many aspects of the secure management of IT, particularly in a corporate environment. In recent years, attention has been directed at how this technology might be deployed more broadly, including in a mobile and ubiquitous computing environment. In this talk we aim to do two main things. Firstly we will review the operation of trusted computing technology, which now appears likely to be implemented in future mobile devices (including mobile Phones, PDAs, etc.). Secondly we will consider the possible applications of this technology in mobile devices, e.g. IMEI protection, SIMlock, OMA DRM, and secure application download, and how these applications can be supported using trusted computing technology.
Today we use cryptology in our mobile phones, bank cards and car keys; a few years from now we will live in a world with ubiquitous or pervasive computing with crypto everywhere around us. At the same time our society is becoming increasingly dependent on this technology. Researchers in cryptology have been working for more than 25 years on provable security. Nevertheless, we read regularly in the newspaper that algorithms or their implementations have been broken (DES, MD5, SHA-1, A5/1 etc.). In this talk we will try to explain this paradox, by discussing the strengths and limitations of provable security in cryptology. As cases studies we use the area of hash functions, MAC algorithms and public-key encryption (RSA).
15:00 Confidential Information Flow Detection for Symbolic Transition System
Jeremy Dubreil (INRIA Rennes, France)
15:30 Reasoning About Some Security Protocol Implementation Details
Alfredo Pironti (Politecnico di Torino, Italy)
16:30 Cryptographic Application of Trace Zero Varieties
Emanuele Cesena (Università degli Studi RomaTRE, Italy)
17:00 SESAME: Security for Extensible Software Architectures in Mobile Environments
Phu H. Phung (Chalmers University of Technology, Sweden)
17:00 Privacy-Preserving Access Point Discovery for Mobile Devices
Janne Lindqvist (Helsinki University of Technology, Finland)
17:30 Authentication Protocols based on Human Comparison of Short
Digests in Security Pervasive Computing
Long Nguyen (University of Oxford, UK)