计算机科学
正确性
密码协议
计算机安全
协议(科学)
密钥交换
钥匙(锁)
认证(法律)
简单(哲学)
过程(计算)
软件工程
程序设计语言
密码学
公钥密码术
加密
医学
哲学
替代医学
认识论
病理
作者
José M. Girón-Sierra,César Hernández‐Rodríguez,Almudena Alcaide,Joaquı́n J. Torres
标识
DOI:10.1007/978-3-540-24707-4_98
摘要
Most attacks against security protocols are due to their vulnerable designs. These type of protocols are usually the base which many other protocols and applications are built upon, so proving the correctness of such protocols has become a very important issue in recent years. At the same time, the complexity of security protocols has increased considerably, making it harder to perform an exhaustive analysis of the different situations they are able to deal with. BAN logic was created to assist in the validation of authentication protocols. Although there are other validation logics, we have chosen BAN because we believe its formal process is very simple and robust and therefore facilitates its application to validate old protocols such as Otway-Rees and more complex new ones such as IKE (standard Internet Key Exchange protocol). This paper is based on BAN logic. We will give a brief description of validating procedures and we will demonstrate the validity of BAN foundations, refuting some weaknesses detected by other authors.
科研通智能强力驱动
Strongly Powered by AbleSci AI