Abstract
In this paper, the limitation of the GNY logic about its inability to detect the reflection attacks against some authentication protocols is given. An improvement is proposed which takes into account the possible multiple instances (principals) of the same identity in the model.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Burrows M, Abadi M, Needham R. A logic of authentication. InProceedings of the Royal Society of London A, 1989, 426: 233–271.
Gavin Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. InLecture Notes in Computer Science, Springer Verlag, 1996, 1055: 147–166.
Yiqiang Ding. CCS-based Cryptographic Protocol Analysis (in Chinese), to appear inJournal of Software, 1998.
Gong L, Needham R, Yahalom R. Reasoning about belief in cryptographic protocols. In1990 IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, California. IEEE Computer Society Press, Los Alamitos, California. 1990.
Tanenbaum A S. Computer Networks. 3rd ed. Prentice-Hall International. 1996.
Author information
Authors and Affiliations
Corresponding author
Additional information
Supported by the National Natural Science Foundation of China and the research grants from the Chinese Academy of Sciences.
DING Yiqiang received the B.S. degree in mathematical logic in 1992, and the M.S. degree in theoretical computer science in 1995 both from the Nanjing University. Now, he is a Ph.D. candidate in the Institute of Software, Chinese Academy of Sciences. His research interests are formal methods and network security.
Rights and permissions
About this article
Cite this article
Ding, Y. An improvement of GNY logic for the reflection attacks. J. Comput. Sci. & Technol. 14, 619–623 (1999). https://doi.org/10.1007/BF02951884
Received:
Revised:
Issue Date:
DOI: https://doi.org/10.1007/BF02951884