Extending BAN Logic for Reasoning with Modern PKI-based Protocols

被引:10
|
作者
Sufatrio [1 ]
Yap, Roland H. C. [2 ]
机构
[1] Natl Univ Singapore, Temasek Labs, 5 Sports Dr 2, Singapore 117508, Singapore
[2] Natl Univ Singapore, Sch Comp, Singapore 117590, Singapore
关键词
D O I
10.1109/NPC.2008.86
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
BAN Logic is a well-known authentication logic which, despite other more recent logics and,formal methods. remains popular with many protocol designers. BAN Logic however does not properly deal with the issues of certificates and the use of Public Key infrastructure (PKI). This paper proposes an extension to BAN Logic which focuses on certificate processing within the PKI setting. Our extension is along the lines of the work by Gaarder and Snekkenes but better captures current aspects of PKI. In particular our extension redresses the reasoning on the goodness of private keys, and considers certificate revocation. Common pitfalls in public-key based protocol design are due to insufficient attention placed on the "intended recipient" as well as the stated sender" of a message. Our extension makes the recipient and sender explicit, which reduces the likelihood of introducing such flaws into the protocol and its subsequent proof using BAN Logic In summary, our logic is primarily focused on making BAN Logic more concise yet practical to use on PKI-based protocols.
引用
收藏
页码:190 / +
页数:2
相关论文
共 50 条
  • [1] A static analysis of PKI-based systems
    Aziz, B
    Gray, D
    Hamilton, G
    THEORETICAL COMPUTER SCIENCE, PROCEEDINGS, 2005, 3701 : 51 - 65
  • [2] A PKI-based lightweight workflow model
    Zhang, J
    Sun, JG
    Li, NY
    Hu, CQ
    Li, ZH
    2005 International Conference on Control and Automation (ICCA), Vols 1 and 2, 2005, : 1062 - 1067
  • [3] An open, PKI-based mobile payment system
    Hassinen, Marko
    Hypponen, Konstantin
    Haataja, Keijo
    EMERGING TRENDS IN INFORMATION AND COMMUNICATION SECURITY, PROCEEDINGS, 2006, 3995 : 86 - 100
  • [4] Design and Implementation of PKI-based Certification Authority
    Zheng Ying
    Bai Qinghai
    Zhao Linna
    Chun Hua
    Chen Jing
    SIXTH INTERNATIONAL CONFERENCE ON ELECTRONICS AND INFORMATION ENGINEERING, 2015, 9794
  • [5] A PKI-based secure audit web service
    Xu, Wensheng
    Chadwick, David
    Otenko, Sassa
    PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON COMMUNICATION, NETWORK, AND INFORMATION SECURITY, 2005, : 106 - 110
  • [6] PKI-Based authentication mechanisms in grid systems
    Zhao, Shushan
    Aggarwal, Akshai
    Kent, Robert D.
    INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE, AND STORAGE, PROCEEDINGS, 2007, : 83 - +
  • [7] A logic-based reasoning about PKI trust model
    El Bakkali, H
    Kaitouni, BI
    PROCEEDINGS OF THE SIXTH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, 2001, : 42 - 48
  • [8] A PKI-based Framework for Establishing Efficient MPC Channels
    Masny, Daniel
    Watson, Gaven
    CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 1961 - 1980
  • [9] Mobile PKI: A PKI-based authentication ftamework for the next generation mobile communications
    Gu, JB
    Park, S
    Song, O
    Lee, J
    Nah, JH
    Sohn, SW
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2003, 2727 : 180 - 191
  • [10] Design of PKI-based mobile bank security system
    Yin Can-ju
    Wei Zu-kuan
    ASGIS 2007: 5TH ASIAN SYMPOSIUM ON GEOGRAPHIC INFORMATION SYSTEMS, 2007, : 381 - 385