An Improved Security Protocol Formal Analysis with BAN Logic

被引:3
作者
Li Tingyuan [1 ,2 ]
Liu Xiaodong [2 ]
Qin Zhiguang [1 ]
Zhang Xuanfang [2 ]
机构
[1] Univ Elect Sci & Technol China, Sch Engn & Comp Sci, Chengdu 610054, Peoples R China
[2] Civil Aviat Flight Univ China, Sch Comp, Sichuan 618307, Peoples R China
来源
ECBI: 2009 INTERNATIONAL CONFERENCE ON ELECTRONIC COMMERCE AND BUSINESS INTELLIGENCE, PROCEEDINGS | 2009年
关键词
AUTHENTICATION;
D O I
10.1109/ECBI.2009.101
中图分类号
F [经济];
学科分类号
02 ;
摘要
BAN logic can prove whether a protocol can reach expected target and find some flaws in the protocol. The paper analyzed constitute of BAN logic and analysis steps. On the basis of the above work, BAN logic was used to construct an ideal model of the improved NSSK protocol and the security of the NSSK protocol was analyzed with the initial hypothesis and the logic postulate. The paper also pointed out various kinds of demerit of BAN logic and discussed some possible improvement.
引用
收藏
页码:102 / +
页数:2
相关论文
共 12 条
[1]  
BURROWS M, 1990, ACM T COMPUT SYST, V8, P18, DOI [10.1145/77648.77649, 10.1145/74851.74852]
[2]   A LOGIC OF AUTHENTICATION [J].
BURROWS, M ;
ABADI, M ;
NEEDHAM, RM .
PROCEEDINGS OF THE ROYAL SOCIETY OF LONDON SERIES A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 1989, 426 (1871) :233-271
[3]  
Deng Y., 2006, CHAOHU COLL J, V78, P36
[4]  
DENG YJ, 2006, CHAOHU COLL J, V78, P34
[5]  
Meadows C., 2003, IEEE J SELECTED AREA, V21
[6]   USING ENCRYPTION FOR AUTHENTICATION IN LARGE NETWORKS OF COMPUTERS [J].
NEEDHAM, RM ;
SCHROEDER, MD .
COMMUNICATIONS OF THE ACM, 1978, 21 (12) :993-999
[7]  
QING SH, 2005, SECURITY PROTOCOL
[8]  
Wang Yadi, 2006, CRYPTOGRAPHIC PROTOC
[9]  
[杨世平 YANG Shiping], 2006, [计算机工程, Computer Engineering], V32, P126
[10]  
Yang Shiping, 2006, COMPUTER ENG, V32, P130