<?xml version="1.0"?>
<News hasArchived="false" page="1" pageCount="1" pageSize="10" timestamp="Mon, 20 Apr 2026 12:12:08 -0400" url="https://beta.my.umbc.edu/groups/csee/posts.xml?tag=cryptography">
<NewsItem contentIssues="false" id="141826" important="false" status="posted" url="https://beta.my.umbc.edu/groups/csee/posts/141826">
<Title>Talk: Binding Cryptographic Context to Messages, 12-1 May 10</Title>
<Tagline>Automatically in Network Protocols Using Formal Methods</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><div><strong>UMBC Cyber Defense Lab</strong></div><div><strong><br></strong></div><div><strong>Automatically Binding Cryptographic Context to Messages in Network Protocols Using Formal Methods</strong></div><div><strong><br></strong></div><div><strong>Dr. Enis Golaszewski</strong></div><div><strong>CSEE Dept., UMBC</strong></div><div><strong><br></strong></div><div><strong>12–1pm ET, Friday, May 10, 2024 via <a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">WebEx</a></strong></div><div> </div><div>We present an automatic method that binds any two-role protocol to an underlying unique cryptographic context. Our method eliminates a large class of adverse protocol interactions (e.g., man-in-the-middle attacks) and facilitates proving authentication properties of the transformed protocol automatically. We transform the original protocol by combining it with a context-exchange protocol, in which the initiator and the responder collaborate to construct a cryptographic context for the original protocol. Represented as a Merkle hash tree, the cryptographic context comprises protocol parameters, session parameters, and fresh nonces. Each party signs the context. To complete the transformation, we interleave messages of the context-exchange protocol with the original protocol’s messages. We then generate authentication security goals, which we verify automatically using the Cryptographic Protocol Shapes Analyzer (CPSA). To illustrate our method, we transform two flawed examples, Needham-Schroeder (NS) and Blanchet’s Simple Protocol (BSP), and prove that our method corrects each protocol in the Dolev-Yao (DY) adversarial model. Our method does not alter the message structure of the original protocol and does not require the original protocol to have any particular security properties. The transformed protocol requires each original message to include an encrypted hash and a fresh nonce, adds an extra message, and computes hashes and encryptions that scale linearly with the number of protocol steps.</div><div><br></div><div>Support for this research was provided in part by the National Security Agency under an INSuRE+C grant via Northeastern University.</div><div><br></div><div>In May 2024, Enis Golaszewski (<a href="mailto:golaszewski@umbc.edu">golaszewski@umbc.edu</a>) completed his PhD in computer science at UMBC under Alan T. Sherman, where he researches and teaches cryptographic protocol analysis.</div><div><br></div><div>Support for this event was provided in part by the National Science Foundation under SFS grant DGE-1753681.</div></div>
]]>
</Body>
<Summary>UMBC Cyber Defense Lab     Automatically Binding Cryptographic Context to Messages in Network Protocols Using Formal Methods     Dr. Enis Golaszewski  CSEE Dept., UMBC     12–1pm ET, Friday, May...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/141826/guest@my.umbc.edu/4ec6918000c31657679fd85f263b7771/api/pixel</TrackingUrl>
<Tag>cryptography</Tag>
<Tag>cybersecurity</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 08 May 2024 14:42:30 -0400</PostedAt>
</NewsItem>

</News>
