An Alternate Explanation of two BAN-logic "failures"

نویسنده

  • Paul C. van Oorschot
چکیده

Boyd and Mao (“On a Limitation of BAN Logic”, in these proceedings) suggest that it is easy to use the authentication logic of Burrows, Abadi and Needham to approve protocols that are in practice unsound, and present two examples. We illustrate that the problem in the first example can be traced to a violation of pre-conditions in the BAN analysis (involving ill-founded trust in a trusted server), while in the second the idealization is simply incorrect. For the latter, a general guideline is proposed to avoid similar problems in the future.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On BAN Logics for Industrial Security Protocols

This paper reports on two case-studies of applying BAN logic to industrial strength security protocols. These studies demonstrate the flexibility of the BAN language, as it caters for the addition of appropriate constructs and rules. We argue that, although a semantical foundation of the formalism is lacking, BAN logic provides an intuitive and powerful technique for security analysis.

متن کامل

Blackburn on the Ban on Mixed

【Subject Class】Ethics, Meta-Ethics 【Keyword】Moral Realism, Moral Projectivism, Moral Facts, Moral Supervenience, Simon Blackburn 【Abstract】This is a realist response to Blackburn’s version of the explanatory inadequacy of the moral thesis based on the ban on mixed worlds, and to its possible explanatory reductionism version. First, the moral supervenience relationship is made explicit, for the ...

متن کامل

A Uniied Cryptographic Protocol Logic

We present a logic for analyzing cryptographic protocols. This logic is based on a uniication of four of its predecessors in the BAN family of logics, namely those given in GNY90], AT91], vO93b], and BAN itself BAN89]. The logic herein captures the desirable features of its predecessors and more; nonetheless, as a logic it is relatively simple and simple to use. We also present a model-theoreti...

متن کامل

A Fuzzy Approach to Sequential Failure Analysis Using Petri nets

In highly competitive industrial market, the concept of failure analysis is an unavoidable fact in complex industrial systems. Reliability of such systems not only depends on the reliability of each element of these systems, but also depends on occurrence of sequence of failures. In this paper, a novel approach to sequential failure analysis is proposed which is based upon fuzzy logic and the c...

متن کامل

On a Limitation of BAN Logic

In the past few years a lot of attention has been paid to the use of special logics to analyae cryptographic protocols, foremost among these being the logic of Burrows, Abadi and Needham (the BAN logic). These logics have been successful in finding weaknesses in various examples. In this paper a limitation of the BAN logic is illustrated with two examples. These show that it is easy for the BAN...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1993