Efficient and timely mutual authentication
ACM SIGOPS Operating Systems Review
An alternate explanation of two BAN-logic “failures”
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
A critique of the Burrows, Abadi and Needham logic
ACM SIGOPS Operating Systems Review
A Formal Framework for Authentication
ESORICS '92 Proceedings of the Second European Symposium on Research in Computer Security
An alternate explanation of two BAN-logic “failures”
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Prudent Engineering Practice for Cryptographic Protocols
IEEE Transactions on Software Engineering
A complete and decidable security-specialised logic and its application to the TESLA protocol
AAMAS '06 Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems
Cross-layer verification of type flaw attacks on security protocols
ACSC '07 Proceedings of the thirtieth Australasian conference on Computer science - Volume 62
Verification of authentication protocols for epistemic goals via SAT compilation
Journal of Computer Science and Technology
A logical verification method for security protocols based on linear logic and BAN logic
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
What do we mean by entity authentication?
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
Limitations on design principles for public key protocols
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
The dancing bear: a new way of composing ciphers
SP'04 Proceedings of the 12th international conference on Security Protocols
A protocol for secure public instant messaging
FC'06 Proceedings of the 10th international conference on Financial Cryptography and Data Security
Anonymous channel and authentication in wireless communications
Computer Communications
Analysis of mobile authentication protocols by SVO logic
Proceedings of the First International Conference on Security of Internet of Things
Hi-index | 0.00 |
In the past few years a lot of attention has been paid to the use of special logics to analyse cryptographic protocols, foremost among these being the logic of Burrows, Abadi and Needham (the BAN logic). These logics have been successful in finding weaknesses in various examples. In this paper a limitation of the BAN logic is illustrated with two examples. These show that it is easy for the BAN logic to approve protocols that are in practice unsound.