The study on the application of BAN logic in formal analysis of authentication protocols

被引:0
|
作者
Wen, Jinghua [1 ]
Zhang, Mei [1 ]
Li, Xiang [1 ]
机构
[1] Informat Inst GuiZhou Coll Finance & Ecno, Guiyang 550004, Peoples R China
关键词
authentication protocols; formalization analysis; BAN logic;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
The authentication protocol is the most fundamental and critical issue in network security and safety system and BAN logic is the most important tool to have a formalization analysis of authentication protocols. This paper first attempts to illustrate the basic methods for BAN logic analysis protocols by making a comparative study between two simplified cases, and then discusses the function of BAN logic in formalization analysis, finally exploring its limitation and methods for improvement.
引用
收藏
页码:744 / 747
页数:4
相关论文
共 50 条
  • [21] Formal analysis of cryptographic protocols in a knowledge algorithm logic framework
    State Key Laboratory for Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing 100080, China
    不详
    不详
    Chin J Electron, 2007, 4 (701-706):
  • [22] Formal unlinkability analysis of message authentication protocols based on authentic channels
    Alagheband, Mahdi R.
    Mashatan, Atefeh
    JOURNAL OF SUPERCOMPUTING, 2023, 79 (07): : 8097 - 8123
  • [23] Formal analysis of cryptographic protocols in a knowledge algorithm logic framework
    Xiao, Meihua
    Xue, Jinyun
    CHINESE JOURNAL OF ELECTRONICS, 2007, 16 (04): : 701 - 706
  • [24] A formal analysis of authentication protocols for mobile devices in next generation networks
    Aiash, Mahdi
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (12): : 2938 - 2953
  • [25] Research to formal analysis methods for public-key authentication protocols
    Qian, Yong
    Gu, Da-Wu
    Chen, Ke-Fei
    Bai, Ying-Cai
    Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2002, 23 (02):
  • [26] Formal unlinkability analysis of message authentication protocols based on authentic channels
    Mahdi R. Alagheband
    Atefeh Mashatan
    The Journal of Supercomputing, 2023, 79 : 8097 - 8123
  • [27] Formal automatic verification of authentication cryptographic protocols
    Debbabi, M
    Mejri, M
    Tawbi, N
    Yahmadi, I
    FIRST IEEE INTERNATIONAL CONFERENCE ON FORMAL ENGINEERING METHODS, PROCEEDINGS, 1997, : 50 - 59
  • [28] Rfid authentication protocol design via BAN logic
    Wang, Minghui, 1600, Journal of Chemical and Pharmaceutical Research, 3/668 Malviya Nagar, Jaipur, Rajasthan, India (06):
  • [29] Formal Analysis on RFIDI Authentication Protocols Against De-Synchronization Attack
    Yeh, Kuo-Hui
    Lo, Nai-Wei
    Kuo, Ren-Zong
    Su, Chunhua
    Chen, Hsuan-Yu
    JOURNAL OF INTERNET TECHNOLOGY, 2017, 18 (04): : 765 - 773
  • [30] Formal design of efficient authentication and key agreement protocols
    Jacobson, G
    SECURE INFORMATION NETWORKS: COMMUNICATIONS AND MULTIMEDIA SECURITY, 1999, 23 : 96 - 113