Abstract:
The lecture discusses the main properties and vulnerabilities of cryptographic protocols. Some well known examples of attacks on cryptographic protocols are considered. The second part of the lecture contains an overview of modern protocol verification tools.