This paper points out some flaws in BAN-logic, and presents a modified version of the BAN-logic, which has a sound semantics and correct loigc rules. It is concluded that, if the initial condition is right, the result from this logic is right as well.
Burrows M,Abadi M,Needham R.A logic of authentication[J].ACM Trans.on Computer Systems.1990,8(1):18-36[2]Boyd C,Mao W.On a limitations of BAN logic.In Lecture Notes in Computer Science 765,Berlin:Springer-Verlag,1993,240-247.[3]Nessett D M.A Critique of Burrows,Abadi and Needham logic[J].Operating Systems Review.1990,24(2):35-38[4]Li Gong,Needham R,Yahalom R.Reasoning about belief in cryptographic protocols.In Pro-ceedings of the 1990 IEEE Computer Society Symposium on Research in Security and Privacy,Oakland,California:1990,234-248.[5]Abadi M,Tuttle M.A semantics for a logic of authentication.In Proceedings of the Tenth ACM Symposium on Principles of Distributed Computing,Sanantonio,Texas:ACM Press,August1991,201-216.[6]Syverson P,Van Oorschot P C.On unifying some cryptographic protocol logics.In Proceedings of 1994 IEEE Symposium on Security and Privacy.IEEE Computer Society Press,Okland California:1994,165-177.[7]田建波,徐胜波,王育民.一种改进的认证逻辑.电子学报,1998,26(7):175-177.[8]郑东,田建波,王育民.关于BAN-逻辑的注记.China Crypt98,北京:科学出版社,1998,123-125.