The Descent of BAN
نویسندگان
چکیده
The famous BAN paper [3] determined the research agenda of security-protocol verification for nearly a decade. Many others had worked on verifying security protocols, and the problem appeared to be intractable. The real-world systems were too complicated; too many different things could go wrong; the formal treatments were unusable. The BAN logic was abstract, formalizing intuitive notions directly. For example, if you receive a message containing a secret password and you know that the password is known only to you and Joe, then the message must have come from Joe. BAN proofs were short and simple, and each reasoning step could easily be rendered into plain English. BAN certainly had some deficiencies. The paper incorrectly claimed that the Otway-Rees protocol could be simplified in a certain way. In fact, an intruder could attack this protocol, masquerading as Bob to Alice, when Bob was not even present [7]. More generally, BAN ignored all non-encrypted information, so it could " verify " any protocol that broadcast the session key in clear. Some criticisms arose from a misunderstanding of the logic's objectives. BAN assumed that the protocol would not give secrets away—a defensible assumption, since cryptanalysts already knew how to investigate such questions. BAN's strength was that it provided a precise notation and deductive mechanism for reasoning about freshness and authenticity. Researchers introduced a great variety of other authentication logics. These were generally more complicated than BAN. Dietrich [4] published a proof of the Secure Sockets Layer (SSL) protocol using the belief logic NCP (Non-monotonic Cryptographic Protocols). This logic allowed formulae to be retracted as well as asserted, and the author accordingly had to write lengthy lists of facts holding at each step. NCP must have been more precise than BAN, but it was obviously difficult to use. Some people attempted to build automatic provers for the BAN logic, which was pointless: BAN logic proofs were easy to write, and if you wrote them yourself, you were unlikely to reach an absurd conclusion. For the more complicated authentication logics, automation became essential; Brackin [2] was a leading exponent of this approach. As do-it-yourself logics
منابع مشابه
شیوع مصرف سیگار و ممنوعیت مصرف آن در ماشین در خانواده های شیرخواران
Background and purpose: Ïnfants’ exposure to cigarette smoke is one of the most crucial public health concerns. Smoking ban in enclosed spaces are a simple way to reduce exposure to cigarette smoke and its harmful effects. This study was conducted to determine the prevalence of cigarette smoking, car smoking ban and the related factors in families with infants living in Tehran. Materials and...
متن کاملThe effect of time interval between descent of the Quran and commentator on the commentary
The Holy Quran was descended from Almighty Allah to the Holy Prophet (AS) about the last 14 centuries and there has been a time interval between descent of the Quran and its existing readers and commentators. This Question is posed whether this time interval between descent of the Quran and commentator will effect on verses understanding and their commentary or not? As one of commentary princip...
متن کاملAn eigenvalue study on the sufficient descent property of a modified Polak-Ribière-Polyak conjugate gradient method
Based on an eigenvalue analysis, a new proof for the sufficient descent property of the modified Polak-Ribière-Polyak conjugate gradient method proposed by Yu et al. is presented.
متن کاملA Free Line Search Steepest Descent Method for Solving Unconstrained Optimization Problems
In this paper, we solve unconstrained optimization problem using a free line search steepest descent method. First, we propose a double parameter scaled quasi Newton formula for calculating an approximation of the Hessian matrix. The approximation obtained from this formula is a positive definite matrix that is satisfied in the standard secant relation. We also show that the largest eigen value...
متن کاملImpact of Beef Ban on Economy and Meat Processing Industry of India: A Complete Value Chain Analysis
The recent ban on cow slaughtering in India has brought into debate highly emotive and contentious issues to the forefront The meat industry is characterized by controls across the entire value-chain of production and sale, which not only hampers its efficiency but also exacerbates the. The growth and development in meat industry in particular and the country in general has multiple linkages wi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015