DocumentCode :
2734502
Title :
An augmentation of BAN-like logics
Author :
Mao, Wenbo
Author_Institution :
Hewlett-Packard Labs., Bristol, UK
fYear :
1995
fDate :
13-15 Jun 1995
Firstpage :
44
Lastpage :
56
Abstract :
We address a common problem of a series of logics for analysis of authentication protocols due to Burrows-Abadi-Needham (BAN), Gong-Needham-Yahalom (GNY), Abadi-Tuttle (AT) and Syverson-Van Oorschot (SVO). The problem can be referred to as that these logics lack a computationally accountable means to perform an important protocol analysis step, called protocol idealization which is to transform some protocol messages into logical formulas. Mistakes may easily occur during the idealization steps in these logics. We propose a rule-based technique to turn the protocol idealization into a job of symbolic manipulation of protocol syntax. The idea is to refine a big step of protocol message transformation in the previous BAN techniques into several smaller ones; each smaller step is simpler and hence easier to understand. Thus, the protocol idealization becomes less error-prone. A number of idealization examples are demonstrated. We hope that these intuitively appealing examples will invite further studies in the correctness of our rules-based technique for protocol idealization
Keywords :
formal logic; message authentication; protocols; BAN-like logics augmentation; authentication protocols; protocol idealization; protocol syntax; rule-based technique; symbolic manipulation; Authentication; Body sensor networks; Computational modeling; Debugging; Laboratories; Logic; Performance analysis; Protocols;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Security Foundations Workshop, 1995. Proceedings., Eighth IEEE
Conference_Location :
County Kerry
ISSN :
1063-6900
Print_ISBN :
0-8186-7033-9
Type :
conf
DOI :
10.1109/CSFW.1995.518552
Filename :
518552
Link To Document :
بازگشت