Britta Hale

1

Britta Hale

Ph.D. started in: 2014
Year of graduation: 2017
COINS consortium member: Norwegian University of Science and Technology
Supervised by: Colin Boyd
Links: CristinDBLP
Research area: Cryptography
Project title: Modelling and Analysis of Real-World Cryptographic Authentication and Key-Exchange Protocols
Project description: While many key-agreement protocols exist and have been proven secure in the theoretical world, the security of these schemes may be questionable in application due to the many protocols details left unspecified in proofs. For example, the negotiation of parameters can provide an adversary with an opportunity to weaken a protocol scheme – yet specification of this step is often left out of protocol security proofs.

The aim of this ongoing research is to provide security proofs for the ISO 11770 standard for authentication, TLS, SSH, IPsec, etc., that incorporate all aspects of the protocol. Ultimately, the goal is to achieve this by modeling protocols in two parts – a partially specified protocol (PSP) which contains the theoretical protocol core, and all other protocol details (PD) not specified in the PSP. Considering the PD as an adversarial tool to be used against the PSP will allow a worse-case-scenario model. Any security proof for the PSP in this model will substantiate the security of the whole protocol.

Publications:

  1. Colin Alexander Boyd, Britta Hale (2017). Secure Channels and Termination: The Last Word on TLS
  2. Felix Günther, Britta Hale, Tibor Jager, Sebastian Lauer (2017). 0-RTT Key Exchange with Full Forward Secrecy
  3. Felix Günther, Britta Hale, Tibor Jager, Sebastian Lauer (2017). 0-RTT Key Exchange with Full Forward Secrecy
  4. Britta Hale (2017). Expanding ACCE: Robust Secure Channel Establishment
  5. Britta Hale (2017). Low-Latency Key Exchange and Secure Channels
  6. Britta Hale (2017). Secure Channels
  7. Britta Hale (2017). Sikkerhet i en digital verden med hackere hakk i hæl
  8. Britta J. Hale (2017). Deep Web and Dark Web
  9. Britta J. Hale (2017). Signal: What, Why, How
  10. Britta Hale, Christopher Carr, Danilo Gligoroski (2017). CARIBE: Cascaded IBE for maximum flexibility and user-side control
  11. Britta Hale, Tibor Jager, Sebastian Lauer, Jorg Schwenk (2017). Simple security definitions for and constructions of 0-RTT key exchange
  12. Charlotte S. Rikardsen, Britta Hale, Stig Frode Mjølsnes (2017). User Understanding and Perspectives on End-to-End Encrypted Instant Messaging Apps
  13. Colin Alexander Boyd, Britta Hale (2016). Secure Channels and Termination: The Last Word on TLS
  14. Colin Alexander Boyd, Britta Hale, Stig Frode Mjølsnes, Douglas Stebila (2016). A Hierarchy of Authentication and Authenticated Encryption Constructions with Application to TLS
  15. Colin Alexander Boyd, Britta Hale, Stig Frode Mjølsnes, Douglas Stebila (2016). From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS
  16. Colin Alexander Boyd, Britta Hale, Stig Frode Mjølsnes, Douglas Stebila (2016). From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS
  17. Colin Alexander Boyd, Britta Hale, Stig Frode Mjølsnes, Douglas Stebila (2016). Stateful Authentication and AEAD Experiments: Constructing a Bridge in the Analysis of TLS
  18. Britta Hale (2016). From Key Exchange to Secure Channels: Analysis of Real-World Protocols
  19. Britta J. Hale (2016). A Perfect Memory: Key Compromise in an Efficiency-centric World
  20. Britta J. Hale, Christopher Carr, Danilo Gligoroski (2016). CARIBE: Cascaded IBE for Maximum Flexibility and User-side Control
  21. Britta Hale (2015). Implications between Authentication Levels and Secure Termination
  22. Britta Hale, Christopher Alan Carr, Danilo Gligoroski (2015). CARIBE-S: A Cascaded IBE Scheme for Maximum Flexibility and User-side Control
  23. Britta J. Hale, Colin Alexander Boyd (2014). Computationally Analyzing the ISO 9798-2.4 Authentication Protocol
  24. Britta J. Hale, Colin Alexander Boyd (2014). Computationally Analyzing the ISO 9798-2.4 Authentication Protocol
Partners visited:
  1. ENISA, Athens, Greece, 2015
Events attended with COINS funding:
  1. Secure Cloud Services and Storage Workshop, Oslo, Norway, 2017
  2. Crypto vs Mass Surveillance Workshop, Trondheim, Norway, 2016
  3. ArcticCrypt, Longyearbyen, Svalbard, Norway, 2016
  4. COINS Finse winter school , Finse, Norway, 2016
  5. CySeP, Stockholm, Sweden, 2015
  6. NordSec 2015, Stockholm, Sweden, 2015
  7. COINS Ph.D. student seminar, Stockholm, Sweden, 2015
  8. COINS Summer School on Cloud Security, Metochi, Greece, 2015
  9. FRISC Finse winter school, Finse, Norway, 2015
  10. ISC, Trondheim, Norway, 2015
  11. FRISC Finse winter school, Finse, Norway, 2014
This entry was posted in Alumni and tagged . Bookmark the permalink.