Sunday, April 21, 2019
BAN - A Logic of Authentication Essay Example | Topics and Well Written Essays - 2250 words
BAN - A Logic of Authentication - Essay ExampleAs a result, Borrows, Abadi and Needham formulated a system of logic of belief and action, to address these errors. The logic allows people to formally withdraw the beliefs of trustworthy distinguishies involved in these authentication protocols, thus uncovering subtleties, redundancies and flaws through an analysis of the protocols syntax and semantics. Borrows, Abadi and Needham fulfil four published protocols into account, in order to show how they illustrate the appropriateness of this logical method of analysis. barely how sound is the logic that they are proposing? How far tummy a vague and ambiguous logic calculate us? This paper aims to introduce the famous BAN (Borrows, Abadi and Needham) logic and its use on unmatched of the published protocols (i.e. Kerberos), to discuss the logics success, its successors, and to review the critiques made on the logic. This paper is based on the article A Logic of Authentication publis hed in 1989 by the authors Michael Burrows, Martin Abadi and Roger Needham, University of Cambridge. The paper was nominated for event in TOCS by the Program Committee for the ACM SIGOPS Symposium on Operating Systems Principles, December 1989. The three authors completed part of this work at Digital Equipment Corporation and part at the University of Cambridge. 2 Chapter 2 Introduction In this chapter a brief introduction to the basic principles of the BAN logic is discussed as well as a short section about earnest measure protocols. 2.1 An Introduction to Borrows, Abadi, Need- ham (BAN) Logic The BAN Logic is named aft(prenominal) Borrows, Abadi and Needham. The logic is, as they stated, a logic of belief and action. It contains no logical inversions on that pointfore it cannot be utilize to prove that a protocol is flawed. But when proof, that a protocol is correct, cannot be obtained, that protocol deserves to be inured with suspicion ?. In other words BAN logic does not aim to prove the security of a protocol it can only catch certain kinds of subtle errors, help us to fence about the protocol, and help us identify and formalize our assumptions and analysis. Details of the BAN logic such as the idealization of protocol transactions, along with the various inference rules, will be discussed on the later sections. The authors of A Logic of Authentication introduce the BAN logic to protocol designers whom they believe are inappropriately copy available techniques thus coming up with protocols containing many security flows. The authors explain the basic notation of the logic and five rules that are applied to analyze protocols. Afterwards, they move on to actually idealize different exist protocols to conclude that such a simple logic can capture subtle differences between protocols. If there is one thing that the authors forgot to mention, that would be the basic definitions of frequently used terms. So in this paper I will try my best to define th ose terms. 3 CHAPTER 2. INTRODUCTION 4 2.1.1 Security Protocols A security protocol usually uses cryptography to distribute messages, authenticate the communicating parties and protects data over an insecure network. It can be defined as a set of transactions or traces. Each transaction consists of a series of communication events, some of which are perhaps interleaved protocol runs. Every desirable
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment