Skip to main content
Log in

An improvement of GNY logic for the reflection attacks

  • Notes
  • Published:
Journal of Computer Science and Technology Aims and scope Submit manuscript

Abstract

In this paper, the limitation of the GNY logic about its inability to detect the reflection attacks against some authentication protocols is given. An improvement is proposed which takes into account the possible multiple instances (principals) of the same identity in the model.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Burrows M, Abadi M, Needham R. A logic of authentication. InProceedings of the Royal Society of London A, 1989, 426: 233–271.

  2. Gavin Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. InLecture Notes in Computer Science, Springer Verlag, 1996, 1055: 147–166.

  3. Yiqiang Ding. CCS-based Cryptographic Protocol Analysis (in Chinese), to appear inJournal of Software, 1998.

  4. Gong L, Needham R, Yahalom R. Reasoning about belief in cryptographic protocols. In1990 IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, California. IEEE Computer Society Press, Los Alamitos, California. 1990.

    Google Scholar 

  5. Tanenbaum A S. Computer Networks. 3rd ed. Prentice-Hall International. 1996.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ding Yiqiang.

Additional information

Supported by the National Natural Science Foundation of China and the research grants from the Chinese Academy of Sciences.

DING Yiqiang received the B.S. degree in mathematical logic in 1992, and the M.S. degree in theoretical computer science in 1995 both from the Nanjing University. Now, he is a Ph.D. candidate in the Institute of Software, Chinese Academy of Sciences. His research interests are formal methods and network security.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Ding, Y. An improvement of GNY logic for the reflection attacks. J. Comput. Sci. & Technol. 14, 619–623 (1999). https://doi.org/10.1007/BF02951884

Download citation

  • Received:

  • Revised:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF02951884

Keywords

Navigation