關(guān)于BAN邏輯擴(kuò)展的注記
A NOTE ON THE AUGMENTATION OF BAN-LIKE LOGICS
-
摘要: 本文指出了W.Mao(1995)對(duì)其協(xié)議(1)的證明中存在的錯(cuò)誤,并對(duì)其在協(xié)議理想化過程中提出的N-u規(guī)則作了探討,指出其擴(kuò)展N-u的三條規(guī)則的缺陷,并作了改進(jìn),最后,給出一個(gè)例子說明N-u規(guī)則的應(yīng)用。
-
關(guān)鍵詞:
- 認(rèn)證協(xié)議; BAN邏輯
Abstract: This paper points out a mistake occurred in the Protocol(1)(W.Mao, 1995), the mistake is due to a wrong initial assumption, also this paper shows the weakness of the N-u based-rules. Finaly, an application of the N-u rules is given by an example. -
Butrrows M,Abadi M,Needham R A logic of authentication,Technical Report SRC Technical Report 39,Digital Equipment Corporation,F(xiàn)ebruary 1998.[2]Abadi M,Tuttle M R.A semantics for a logic of authentication (extended abstract).In Proceedings of Tenth Annual ACM Symposium on Principles of Disttributed Computing, At Montreal,Quebec,Canada:August 199l,20l-216.[3]Syverson P,Van Oorschot P C.On unifying some cryptographic protocol logics.In Proceeding of 1994 IEEE Symposium on Security and Privacy Oakland,California:IEEE Computer Society Ptess,1994,165-177.[4]Mao W,Boyd C Development of authentication protocols:Some misconceptions and a new approach.In Proceedings of Computer Security Foundations Workshop VII.Franconia:IEEE Computer Society Press,1994,178-186.[5]Mao W An augmentation of BAN-like logics,In Proceeding of IEEE Computer Society Symposium on Research in Security and Privacy Oakland,California:1995,44-56.[6]Gong L.Needham R,Yahalom R.Reasoning about belief in cryptographic protocols,In Proceedings of the l990 IEEE Symposium on Research in Security and Privacy,Oakland,California:1990,234-248.[7]Kesser V,Wedel G,AUOLOG-An advanced logc of anthentication.Proc,of the computer Security Foundations Workshop VII, Franconia:IEEE computer society Press 1994,90-99. -
計(jì)量
- 文章訪問數(shù): 2040
- HTML全文瀏覽量: 93
- PDF下載量: 403
- 被引次數(shù): 0