Skip to main content

A Complete Logic of Authentication

  • Chapter
Advanced Computer Systems

Part of the book series: The Springer International Series in Engineering and Computer Science ((SECS,volume 664))

  • 180 Accesses

Abstract

This paper is devoted to one of the hot topics these days: open computer networks security. It relies on the use of secure protocols called authentication cryptographic protocols. In the recent several years a lot of attention has been paid to analyze these protocols. One of the methods of their analysis is that of formal methods. Burrows, Abadi, Needham and others have proposed a few logics for verification of the authentication protocols properties (called BANlogic). These are specialized versions of modal belief logic with special constructs for expressing some of the central concepts used in authentication processes. These logics have revealed many subtleties and serious flaws in published and widely applied authentication protocols. Unfortunately, they have also created some confusion. For example, they are not complete. In the present paper we propose a new version of authentication logic. We introduce a convenient formal language for specifying and reasoning about ryptographic protocols properties. We also provide an axiomatic inference system, a model of computation, and semantics. We prove completeness and some other important properties of this logic and discuss its expressive power.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Tarski A., Mostowski A., Robinson R., Undecidable theories, North Holland 1953.

    Google Scholar 

  2. Needham R, Schroeder M., Using encryption for authentication in large networks of computers, Communications of the ACM, 21(12), (1978) pp. 993–999.

    Article  MATH  Google Scholar 

  3. Burrows M., Abadi M. and Needham R, A logic of authentication, Research Report 39, Digital Systems Research Center, February 1989.

    Google Scholar 

  4. Gong L, Needham R., Yahalom R., Reasoning about belief in cryptographic protocols, In Proceedings of the 1990 IEEE Symposium on Security and Privacy, (1990) pp. 234–248, IEEE Computer Society Press.

    Google Scholar 

  5. Abadi M., Tuttle M., A semantics for a logic of authentication, In Proceedings of the tenth ACM Symposium on Principles of Distributed Computing, pp. 201–216, ACM Press, August 1991.

    Google Scholar 

  6. Syverson P., The use of logic in the analysis of cryptographic protocols, In Proceedings of the 1991 IEEE Computer Security Symposium on Security and Privacy, (1991) pp. 156–170, IEEE Computer Society Press.

    Google Scholar 

  7. Syverson P., Meadows C., A logical language for specifying cryptographic protocol requirements, In Proceedings of the 1993 IEEE Computer Security Symposium on Security and Privacy, (1993) pp. 165–177, IEEE Computer Society Press.

    Google Scholar 

  8. Syverson P., van Oorschot P.C., On unifying some cryptographic protocol logics, In Proceedings of the 1994 IEEE Computer Security Foundations Workshop VII, (1994) pp. 14–29, IEEE Computer Society Press.

    Google Scholar 

  9. Lowe G., An attack on the Needham-Schroeder public-key authentication protocol,. Information Processing Letters, 56, (1995) pp. 131–133.

    Article  MATH  Google Scholar 

  10. Lowe G., Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR, In Proceedings of TACAS, (1996) 147–166, Springer Verlag.

    Google Scholar 

  11. Bleeker A., Meertens L., A semantics for BAN logic, In Proceedings of DIMACS’97, (1997) New Brunswick NJ.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Jerzy Sołdek Jerzy Pejaś

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer Science+Business Media New York

About this chapter

Cite this chapter

Kurkowski, M. (2002). A Complete Logic of Authentication. In: Sołdek, J., Pejaś, J. (eds) Advanced Computer Systems. The Springer International Series in Engineering and Computer Science, vol 664. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-8530-9_28

Download citation

  • DOI: https://doi.org/10.1007/978-1-4419-8530-9_28

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4613-4635-7

  • Online ISBN: 978-1-4419-8530-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics