An Improved Security Protocol Formal Analysis with BAN Logic

被引:2
|
作者
Li Tingyuan [1 ,2 ]
Liu Xiaodong [2 ]
Qin Zhiguang [1 ]
Zhang Xuanfang [2 ]
机构
[1] Univ Elect Sci & Technol China, Sch Engn & Comp Sci, Chengdu 610054, Peoples R China
[2] Civil Aviat Flight Univ China, Sch Comp, Sichuan 618307, Peoples R China
关键词
AUTHENTICATION;
D O I
10.1109/ECBI.2009.101
中图分类号
F [经济];
学科分类号
02 ;
摘要
BAN logic can prove whether a protocol can reach expected target and find some flaws in the protocol. The paper analyzed constitute of BAN logic and analysis steps. On the basis of the above work, BAN logic was used to construct an ideal model of the improved NSSK protocol and the security of the NSSK protocol was analyzed with the initial hypothesis and the logic postulate. The paper also pointed out various kinds of demerit of BAN logic and discussed some possible improvement.
引用
收藏
页码:102 / +
页数:2
相关论文
共 50 条
  • [1] Formal Analysis for Security of Otway-Rees Protocol with BAN Logic
    Li Tingyuan
    Liu Xiaodong
    Qin Zhiguang
    Zhang Xuanfang
    [J]. FIRST INTERNATIONAL WORKSHOP ON DATABASE TECHNOLOGY AND APPLICATIONS, PROCEEDINGS, 2009, : 590 - +
  • [2] Security Analysis of the Kerberos protocol using BAN logic
    Fan, Kai
    Li, Hui
    Wang, Yue
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 467 - +
  • [3] Where you are Based Authentication: An Improved Security Protocol Using BAN Logic
    Nabih, Abdelmajid
    Hossain, Alamgir
    Shepherd, Simon
    Khaled, Mahmoud
    [J]. PROCEEDINGS OF THE 7TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2008, : 153 - 162
  • [4] An Improved NSSK Protocol and Its Security Analysis based on Logic Approach
    Chen, Li
    Wang, Weixian
    [J]. 2008 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEM, 2008, : 864 - 867
  • [5] Formal Verification of Secure Evidence Collection Protocol using BAN Logic and AVISPA
    Yogesh, Patil Rachana
    Satish, Devane R.
    [J]. INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA SCIENCE, 2020, 167 : 1334 - 1344
  • [6] Formal Security Analysis of the MaCAN Protocol
    Bruni, Alessandro
    Sojka, Michal
    Nielson, Flemming
    Nielson, Hanne Riis
    [J]. INTEGRATED FORMAL METHODS, IFM 2014, 2014, 8739 : 241 - 255
  • [7] The study on the application of BAN logic in formal analysis of authentication protocols
    Wen, Jinghua
    Zhang, Mei
    Li, Xiang
    [J]. Seventh International Conference on Electronic Commerce, Vols 1 and 2, Selected Proceedings, 2005, : 744 - 747
  • [8] Security Analysis of OIAP Implementation Based on BAN Logic
    Xu Shiwei
    Zhang Huanguo
    Yan Fei
    Xu Mingdi
    Li Zhide
    [J]. MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 144 - +
  • [9] A Formal Security Analysis of the Signal Messaging Protocol
    Cohn-Gordon, Katriel
    Cremers, Cas
    Dowling, Benjamin
    Garratt, Luke
    Stebila, Douglas
    [J]. 2017 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2017, : 451 - 466
  • [10] A Formal Security Analysis of the Signal Messaging Protocol
    Cohn-Gordon, Katriel
    Cremers, Cas
    Dowling, Benjamin
    Garratt, Luke
    Stebila, Douglas
    [J]. JOURNAL OF CRYPTOLOGY, 2020, 33 (04) : 1914 - 1983