In our talk, we present the first formal verification of the security properties of the updated LDACS 3-pass Mutual Authentication and Key Establishment (MAKE) protocol. This protocol allows AS and GS to establish shared keys via Diffie-Hellman or a Key Encapsulation Mechanism, and to mutually authenticate communication partners in a three-way handshake. There are two variants: (1) The LDACS IKEv2 based 3-pass MAKE protocol and (2) the LDACS ISO/IEC 11770-3:2021 key agreement mechanism 7 based 3-pass MAKE protocol. The verification is done with the Tamarin Prover. We present our approach, point out security features and highlight difficulties in modelling the protocol correctly. Our work supports the on-going design and standardizatio...
International audienceWe present the first formal analysis of two avionic protocols that aim to secu...
Security protocols are ubiquitously used in various applications with the intention to ensure secure...
Most of the world's power grids are controlled remotely. Their control messages are sent over potent...
Aeronautical communications systems are currently undergoing a modernization process. Analogue legac...
Aeronautical communications systems are currently undergoing a modernization process. Analogue legac...
Aeronautical communications systems are currently undergoing a modernization process. Analogue legac...
he L-band Digital Aeronautical Communications System (LDACS), the worldwide first true integrated Co...
The "Single European Sky" air traffic management master plan foresees the introduction of several mo...
International audienceWe present the first formal analysis of two avionic protocols that aim to secu...
In Europe the SESAR air traffic management master plan foresees the introduction of several modern d...
In Europe the SESAR air traffic management master plan foresees the introduction of several modern d...
Growth of civil air traffic worldwide poses a great challenge for the supporting Communication, Navi...
[EN] One of the main challenges for the development of the Internet of Things is the authentication ...
This research work analyzes the universal mobile telecommunication system (UMTS) authentication and ...
This research work analyzes the universal mobile telecommunication system (UMTS) authentication and ...
International audienceWe present the first formal analysis of two avionic protocols that aim to secu...
Security protocols are ubiquitously used in various applications with the intention to ensure secure...
Most of the world's power grids are controlled remotely. Their control messages are sent over potent...
Aeronautical communications systems are currently undergoing a modernization process. Analogue legac...
Aeronautical communications systems are currently undergoing a modernization process. Analogue legac...
Aeronautical communications systems are currently undergoing a modernization process. Analogue legac...
he L-band Digital Aeronautical Communications System (LDACS), the worldwide first true integrated Co...
The "Single European Sky" air traffic management master plan foresees the introduction of several mo...
International audienceWe present the first formal analysis of two avionic protocols that aim to secu...
In Europe the SESAR air traffic management master plan foresees the introduction of several modern d...
In Europe the SESAR air traffic management master plan foresees the introduction of several modern d...
Growth of civil air traffic worldwide poses a great challenge for the supporting Communication, Navi...
[EN] One of the main challenges for the development of the Internet of Things is the authentication ...
This research work analyzes the universal mobile telecommunication system (UMTS) authentication and ...
This research work analyzes the universal mobile telecommunication system (UMTS) authentication and ...
International audienceWe present the first formal analysis of two avionic protocols that aim to secu...
Security protocols are ubiquitously used in various applications with the intention to ensure secure...
Most of the world's power grids are controlled remotely. Their control messages are sent over potent...