关于BAN逻辑扩展的注记
A NOTE ON THE AUGMENTATION OF BAN-LIKE LOGICS
-
摘要: 本文指出了W.Mao(1995)对其协议(1)的证明中存在的错误,并对其在协议理想化过程中提出的N-u规则作了探讨,指出其扩展N-u的三条规则的缺陷,并作了改进,最后,给出一个例子说明N-u规则的应用。
-
关键词:
- 认证协议; BAN逻辑
Abstract: This paper points out a mistake occurred in the Protocol(1)(W.Mao, 1995), the mistake is due to a wrong initial assumption, also this paper shows the weakness of the N-u based-rules. Finaly, an application of the N-u rules is given by an example. -
Butrrows M,Abadi M,Needham R A logic of authentication,Technical Report SRC Technical Report 39,Digital Equipment Corporation,February 1998.[2]Abadi M,Tuttle M R.A semantics for a logic of authentication (extended abstract).In Proceedings of Tenth Annual ACM Symposium on Principles of Disttributed Computing, At Montreal,Quebec,Canada:August 199l,20l-216.[3]Syverson P,Van Oorschot P C.On unifying some cryptographic protocol logics.In Proceeding of 1994 IEEE Symposium on Security and Privacy Oakland,California:IEEE Computer Society Ptess,1994,165-177.[4]Mao W,Boyd C Development of authentication protocols:Some misconceptions and a new approach.In Proceedings of Computer Security Foundations Workshop VII.Franconia:IEEE Computer Society Press,1994,178-186.[5]Mao W An augmentation of BAN-like logics,In Proceeding of IEEE Computer Society Symposium on Research in Security and Privacy Oakland,California:1995,44-56.[6]Gong L.Needham R,Yahalom R.Reasoning about belief in cryptographic protocols,In Proceedings of the l990 IEEE Symposium on Research in Security and Privacy,Oakland,California:1990,234-248.[7]Kesser V,Wedel G,AUOLOG-An advanced logc of anthentication.Proc,of the computer Security Foundations Workshop VII, Franconia:IEEE computer society Press 1994,90-99.
计量
- 文章访问数: 2022
- HTML全文浏览量: 87
- PDF下载量: 403
- 被引次数: 0