Zheng Dong, Tian Jianbo, Wang Yumin. A NOTE ON THE AUGMENTATION OF BAN-LIKE LOGICS[J]. Journal of Electronics & Information Technology, 2000, 22(1): 73-77.
Citation:
Zheng Dong, Tian Jianbo, Wang Yumin. A NOTE ON THE AUGMENTATION OF BAN-LIKE LOGICS[J]. Journal of Electronics & Information Technology, 2000, 22(1): 73-77.
Zheng Dong, Tian Jianbo, Wang Yumin. A NOTE ON THE AUGMENTATION OF BAN-LIKE LOGICS[J]. Journal of Electronics & Information Technology, 2000, 22(1): 73-77.
Citation:
Zheng Dong, Tian Jianbo, Wang Yumin. A NOTE ON THE AUGMENTATION OF BAN-LIKE LOGICS[J]. Journal of Electronics & Information Technology, 2000, 22(1): 73-77.
This paper points out a mistake occurred in the Protocol(1)(W.Mao, 1995), the mistake is due to a wrong initial assumption, also this paper shows the weakness of the N-u based-rules. Finaly, an application of the N-u rules is given by an example.
Butrrows M,Abadi M,Needham R A logic of authentication,Technical Report SRC Technical Report 39,Digital Equipment Corporation,February 1998.[2]Abadi M,Tuttle M R.A semantics for a logic of authentication (extended abstract).In Proceedings of Tenth Annual ACM Symposium on Principles of Disttributed Computing, At Montreal,Quebec,Canada:August 199l,20l-216.[3]Syverson P,Van Oorschot P C.On unifying some cryptographic protocol logics.In Proceeding of 1994 IEEE Symposium on Security and Privacy Oakland,California:IEEE Computer Society Ptess,1994,165-177.[4]Mao W,Boyd C Development of authentication protocols:Some misconceptions and a new approach.In Proceedings of Computer Security Foundations Workshop VII.Franconia:IEEE Computer Society Press,1994,178-186.[5]Mao W An augmentation of BAN-like logics,In Proceeding of IEEE Computer Society Symposium on Research in Security and Privacy Oakland,California:1995,44-56.[6]Gong L.Needham R,Yahalom R.Reasoning about belief in cryptographic protocols,In Proceedings of the l990 IEEE Symposium on Research in Security and Privacy,Oakland,California:1990,234-248.[7]Kesser V,Wedel G,AUOLOG-An advanced logc of anthentication.Proc,of the computer Security Foundations Workshop VII, Franconia:IEEE computer society Press 1994,90-99.