Abstract
This paper is devoted to one of the hot topics these days: open computer networks security. It relies on the use of secure protocols called authentication cryptographic protocols. In the recent several years a lot of attention has been paid to analyze these protocols. One of the methods of their analysis is that of formal methods. Burrows, Abadi, Needham and others have proposed a few logics for verification of the authentication protocols properties (called BANlogic). These are specialized versions of modal belief logic with special constructs for expressing some of the central concepts used in authentication processes. These logics have revealed many subtleties and serious flaws in published and widely applied authentication protocols. Unfortunately, they have also created some confusion. For example, they are not complete. In the present paper we propose a new version of authentication logic. We introduce a convenient formal language for specifying and reasoning about ryptographic protocols properties. We also provide an axiomatic inference system, a model of computation, and semantics. We prove completeness and some other important properties of this logic and discuss its expressive power.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Tarski A., Mostowski A., Robinson R., Undecidable theories, North Holland 1953.
Needham R, Schroeder M., Using encryption for authentication in large networks of computers, Communications of the ACM, 21(12), (1978) pp. 993–999.
Burrows M., Abadi M. and Needham R, A logic of authentication, Research Report 39, Digital Systems Research Center, February 1989.
Gong L, Needham R., Yahalom R., Reasoning about belief in cryptographic protocols, In Proceedings of the 1990 IEEE Symposium on Security and Privacy, (1990) pp. 234–248, IEEE Computer Society Press.
Abadi M., Tuttle M., A semantics for a logic of authentication, In Proceedings of the tenth ACM Symposium on Principles of Distributed Computing, pp. 201–216, ACM Press, August 1991.
Syverson P., The use of logic in the analysis of cryptographic protocols, In Proceedings of the 1991 IEEE Computer Security Symposium on Security and Privacy, (1991) pp. 156–170, IEEE Computer Society Press.
Syverson P., Meadows C., A logical language for specifying cryptographic protocol requirements, In Proceedings of the 1993 IEEE Computer Security Symposium on Security and Privacy, (1993) pp. 165–177, IEEE Computer Society Press.
Syverson P., van Oorschot P.C., On unifying some cryptographic protocol logics, In Proceedings of the 1994 IEEE Computer Security Foundations Workshop VII, (1994) pp. 14–29, IEEE Computer Society Press.
Lowe G., An attack on the Needham-Schroeder public-key authentication protocol,. Information Processing Letters, 56, (1995) pp. 131–133.
Lowe G., Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR, In Proceedings of TACAS, (1996) 147–166, Springer Verlag.
Bleeker A., Meertens L., A semantics for BAN logic, In Proceedings of DIMACS’97, (1997) New Brunswick NJ.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2002 Springer Science+Business Media New York
About this chapter
Cite this chapter
Kurkowski, M. (2002). A Complete Logic of Authentication. In: Sołdek, J., Pejaś, J. (eds) Advanced Computer Systems. The Springer International Series in Engineering and Computer Science, vol 664. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-8530-9_28
Download citation
DOI: https://doi.org/10.1007/978-1-4419-8530-9_28
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4613-4635-7
Online ISBN: 978-1-4419-8530-9
eBook Packages: Springer Book Archive