An augmentation of BAN-like logics

نویسنده

  • Wenbo Mao
چکیده

We address a common problem of a series of logics for analysis of authentication protocols due to Burrows-Abadi-Needham (BAN), Gong-Needham-Yahalom (GNY), Abadi-Tuttle (AT) and Syverson-Van Oorschot (SVO). The problem can be referred to as that these logics lack a computationally accountable means to perform an important protocol analysis step, called protocol idealization which is to transform some protocol messages into logical formulas. Mistakes may easily occur during the idealization steps in these logics. We propose a rule-based technique to turn the protocol idealization into a job of symbolic manipulation of protocol syntax. The idea is to re-ne a big step of protocol message transformation in the previous BAN techniques into several smaller ones; each smaller step is simpler and hence easier to understand. Thus, the protocol idealization becomes less error-prone. A number of idealization examples are demonstrated. We hope that these intuitively appealing examples will invite further studies in the correct-ness of our rules-based technique for protocol idealiz-ation.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Use of Belief Logics in the Presence of Causal Consistency Attacks

This paper discusses a class of attacks against cryptographic protocols that have not been previously representable using BAN-style logics. This problem has resulted in the generation of proofs of these protocols that validate nal beliefs of the protocol participants even when successful attacks against these protocols have been demonstrated. The failings of the BAN-style proofs of these protoc...

متن کامل

Revisiting the Foundations of Authentication Logics

In this paper, we make the point that the problems with logics in the BAN tradition are not with the idea of basing reasoning about security protocols using epistemic notions, but with some of the specific decisions taken in the formulation of these logics. To illustrate this statement, we describe a formal logic for security protocol analysis based on well-understood modal operators, knowledge...

متن کامل

The Descent of BAN

The famous BAN paper [3] determined the research agenda of security-protocol verification for nearly a decade. Many others had worked on verifying security protocols, and the problem appeared to be intractable. The real-world systems were too complicated; too many different things could go wrong; the formal treatments were unusable. The BAN logic was abstract, formalizing intuitive notions dire...

متن کامل

Towards a Strand Semantics for Authentication Logic

The logic BAN was developed in the late eighties to reason about authenticated key establishment protocols. It uncovered many aws and properties of protocols, thus generating lots of attention in protocol analysis. BAN itself was also subject of much attention, and work was done examining its properties and limitations, developing extensions and alternatives, and giving it a semantics. More rec...

متن کامل

Towards a Strand Semantics for Authentication Logic

The logic BAN was developed in the late eighties to reason about authenticated key establishment protocols. It uncovered many aws and properties of protocols, thus generating lots of attention in protocol analysis. BAN itself was also subject of much attention, and work was done examining its properties and limitations, developing extensions and alternatives, and giving it a semantics. More rec...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1995