Title
Verification and Modelling of Authentication Protocols
Abstract
With the emergence of numerous distributed services, the importance of electronic authentication in networks is rapidly increasing. Since more than a decade, authentication protocols have been proposed and discussed. Because of various flaws which were found late, Burrows, Abadi and Needham (BAN) created a logic of authen- tication to formally verify authentication protocols by the end of the 80' s.This so called BAN logic has been subject to considerable critique and several extensions have been suggested. None the less, due to its straightforward design and easy understandability , it still attracts the attention of current research.We developed an authentication logic which is built closely after the BAN-logic. It addresses answers to important critiques of the BAN like the non-disclosure problem, and avoids some newly discovered weak- nesses of BAN, e.g. with respect to freshness. We also built a verification tool embody- ing this extended BAN logic and the means for modelling the dif ferent participating principals as finite state machines. The tool allows therefore both for formal, passive analysis of an authentication protocol and for active simulation of a protocol run. W e also can model actions of intruders, consequences of such intrusions, and the respective counter-measures. The tool is implemented in Prolog and facilitates exploratory de- sign of new authentication protocols.
Year
DOI
Venue
1992
10.1007/BFb0013896
ESORICS
Keywords
Field
DocType
authentication logic,verification of authentication protocols,simulation of authenti- cation protocols,authentication protocols,design of authentication protocols,finite state machine,authentication protocol
Lightweight Extensible Authentication Protocol,Wide Mouth Frog protocol,Authentication,Challenge-Handshake Authentication Protocol,Challenge–response authentication,Computer security,Computer science,Data Authentication Algorithm,Authentication protocol,Electronic authentication,Distributed computing
Conference
Volume
ISSN
ISBN
648
0302-9743
3-540-56246-X
Citations 
PageRank 
References 
4
0.80
15
Authors
2
Name
Order
Citations
PageRank
ralf hauser18011.58
E. Stewart Lee2609.22