Song Ronggong, Hu Zhengming, Yang Yixian. THE INVESTIGATION OF THE FRESHNESS IN BAN LOGIC[J]. Journal of Electronics & Information Technology, 2000, 22(3): 505-508.
Citation:
Song Ronggong, Hu Zhengming, Yang Yixian. THE INVESTIGATION OF THE FRESHNESS IN BAN LOGIC[J]. Journal of Electronics & Information Technology, 2000, 22(3): 505-508.
Song Ronggong, Hu Zhengming, Yang Yixian. THE INVESTIGATION OF THE FRESHNESS IN BAN LOGIC[J]. Journal of Electronics & Information Technology, 2000, 22(3): 505-508.
Citation:
Song Ronggong, Hu Zhengming, Yang Yixian. THE INVESTIGATION OF THE FRESHNESS IN BAN LOGIC[J]. Journal of Electronics & Information Technology, 2000, 22(3): 505-508.
Based on BAN s basic constructs and rules, the freshness in BAN logic is investigated. In this paper it is presented that some reasons why BAN logic is in practice unsound are not idealization problems, but problems what some basic rules result in. For the latter, a modified method is proposed to avoid similar problems.
Burrows M,Abadi M,Needham R.A logic of authentication.Technical Report SRC Technical Report 39,Digital Equipment Corporation,February,1989.[2]Abadi M,Tuttle M R.A semantics for a logic of authentication.In Proceedings of Tenth Annual ACM Symposium on Principles of Distributed Computer Science,York:1991,201-216.[3]Boyd C,Mao W.On a limitations of BAN logic.In Lecture Notes in Computer Science 765,Berlin:Springer-Verlag:1993,240-247.[4]Mao W,Boyd C.Towards formal analysis of security protocols.In Proceedings of Computer Security FoundationS Workshop VI,Washington:IEEE Computer Society Press,1993,147-158.[5]Mao W.An augmentation of BAN-like logics.In Proceedings of Computer Security Foundations Workshop VIII,Washington:IEEE Computer Society Press,1995,44-56.[6]van Oorschot P C.An alternate explanation of two BAN-logicfailures.In Lecture Notes in Computer Science 765,Berlin:Springer-Verlag,1993,443-447.