Results 1 to 10 of about 3,562 (188)
On a Limitation of BAN Logic [PDF]
In the past few years a lot of attention has been paid to the use of special logics to analyse cryptographic protocols, foremost among these being the logic of Burrows, Abadi and Needham (the BAN logic). These logics have been successful in finding weaknesses in various examples.
Colin Boyd, Wenbo Mao
openaire +1 more source
Authentication of RSA via BAN logic
Web exchanges are conducted through an open network that lacks central management; it is, therefore, impossible to identify a communication partner, especially in a distributed system. Authentication is the basis of security in such systems. Providing secure communication becomes problematic in CRN because cognitive node can join and leave network ...
Salah A. K. Albermany +1 more
openaire +3 more sources
Security Analysis of GRID Protocol for MANET based on BAN Logic [PDF]
The security of GRID routing protocol based on location information in mobile Ad Hoc networks needs to be verified, so a formal method is introduced to achieve this goal in this paper. Based on BAN logic, this method also combines the characteristics of Ad Hoc network routing protocal.
Shuai Han, Wencheng Jiao
openaire +1 more source
Modified Authentication Protocol and Evaluation Tool: Kerberos and BAN Logic
In today’s world the computer network communication increases the efficiency most of the organizations. Hence threats have been increased due to these online transactions/communications. These threats necessitate the researchers to improve the existing security protocols and /or develop the new ones.
Randhir Bhandari* +2 more
openaire +1 more source
Formal Verification of Secure Evidence Collection Protocol using BAN Logic and AVISPA
Abstract The effect of digitization has led to an increased dependency on the internet. At the same time, cyber-attacks are on the rise due to this increased digitization. In cybercrime cases, digital evidence is of utmost importance. The forensic investigation process always begins after the incident occurred, by that time intelligent attackers got ...
Patil Rachana Yogesh, Devane Satish R
openaire +1 more source
Security Analysis of the Access Control Solution of NDN Using BAN Logic
Named Data Networking (NDN) is a new promising architecture of information-centric networking. Traditional mechanisms of access control can no longer fit appropriately, because of its caching property. Hamdane et al. propose a new access control solution for both closed and open environments.
Yuan Fei, Huibiao Zhu, Phan Cong Vinh
openaire +1 more source
An Alternate Explanation of two BAN-logic “failures” [PDF]
Boyd and Mao ("On a Limitation of BAN Logic", in these proceedings) suggest that it is easy to use the authentication logic of Burrows, Abadi and Needham to approve protocols that are in practice unsound, and present two examples. We illustrate that the problem in the first example can be traced to a violation of pre-conditions in the BAN analysis ...
openaire +1 more source
On BAN logic and hash functions or: how an unjustified inference rule causes problems [PDF]
BAN logic, an epistemic logic for analyzing security protocols, contains an unjustifiable inference rule. The inference rule assumes that possession of H(X) (i.e., the cryptographic hash value of X) counts as a proof of possession of X, which is not the case.
openaire +2 more sources
AUTHENTICATION OF CRNS BY USING BAN LOGIC [PDF]
Israa N. Alsalhi, Salah A. Albermany
openaire +1 more source
SOFTWARE TOOL FOR LOGICAL VALIDATION OF CRYPTOGRAPHIC KEY GENERATION PROTOCOLS BASED ON BAN-LOGIC
The idea of analyzing cryptographic key generation protocols through BAN - logic methods is considered. An e xample of Kerberos protocol analysis is given. The software tool that automates the analysis of key g eneration protocols is built.
openaire +2 more sources

