72,394 Hits in 3.6 sec

The Logic of Authentication Protocols [chapter]

Paul Syverson, Iliano Cervesato
2001 Lecture Notes in Computer Science  
First attempts at formal analysis of authentication protocols were not using logics per se, but were certainly logical.  ...  The goal of the logic is to provide something useful for the analysis of authentication protocols, not to formalize reasoning about ordinary belief.  ... 
doi:10.1007/3-540-45608-2_2 fatcat:bfi5h47qlfgtvodgjfgv7jyiai

Proof of the Authentication Property of Secure WLAN Authentication Scheme (SWAS) using Protocol Composition Logic (PCL)

Rajeev Singh, Teek Parval Sharma
2013 International Journal of Computer Applications  
Protocol Composition Logic (PCL) is used for proving the authentication property of the scheme.  ...  Authentication is one of the essential tools available for security in WLANs.  ...  Proof of the Authentication Property of Secure WLAN Authentication Scheme (SWAS) using Protocol Composition Logic (PCL) INTRODUCTION Several kinds of authentication exist in wireless Local Area Networks  ... 
doi:10.5120/13913-1791 fatcat:thwe5gymqbbm5ibdvs5jk5jlg4

The Logic of Authentication Protocols

Paul Syverson, Iliano Cervesato
First attempts at formal analysis of authentication protocols were not using logics per se, but were certainly logical.  ...  The rationale of authentication has been a topic of study for about a decade and a half.  ...  First attempts at formal analysis of authentication protocols were not using logics per se, but were certainly logical.  ... 
doi:10.1184/r1/6610673.v1 fatcat:7dqettnyjvg4bmxb2fr4xr7c64

Proving Authentication Property of Modified Needham-Schroeder Protocol with Logic of Events

M.H Xiao, C.Y Deng, C.L Ma, K. Zhu, D.L Cheng
2015 Proceedings of the International Conference on Computer Information Systems and Industrial Applications   unpublished
Result shows the logic of events is feasible and general for analyzing cryptographic protocols.  ...  We present novel proof rules and mechanisms for protocol actions and temporal reasoning to check security properties of cryptographic protocols using logic of events theory.  ...  Authentication event logic guarantees that any well-typed protocol is robustly safe under attack while reasoning only about the actions of honest principals in the protocol.  ... 
doi:10.2991/cisia-15.2015.103 fatcat:6pgpw6nw3ncedhdhel2p3kfcsm

On the Properties of Epistemic and Temporal Epistemic Logics of Authentication

Sharar Ahmadi, Mehran S. Fallah, Massoud Pourmahdian
2019 Informatica (Ljubljana, Tiskana izd.)  
The aim of this paper is to provide an overview of the epistemic and temporal epistemic logics which are applied in the analysis of authentication protocols to find out how far these logical properties  ...  The authentication properties of a security protocol are specified based on the knowledge gained by the principals that exchange messages with respect to the steps of that protocol.  ...  A Kripke model of an epistemic logic of authentication can reflect an authentication protocol.  ... 
doi:10.31449/inf.v43i2.1617 fatcat:qbazeyld5zc5vd6lrajugisj3q

Authentication of RSA via BAN logic

Israa N.A. Alsalhi, Salah A. K. Albermany
2019 Journal of Kufa for Mathematics and Computer  
Authentication is the basis of security in such systems.  ...  In this paper, we are using analysis authentication protocol of RSA algorithm by BAN logic also It using C# programing .  ...  The logic of authentication refers to the logical calculus which is based on an accepted set of deduction rules for formal reasoning on authentication protocols.  ... 
doi:10.31642/jokmc/2018/060101 fatcat:q6siue73graklc7wukpuy7jm7e

OTNA: One Time Node Authentication for Secure MANET

Komal Naik(Joshi), Arati M. Dixit
2014 International Journal of Computer Applications  
To the best of our knowledge, OTNA protocol facilitates optimal secure packet delivery. The correctness of the OTNA protocol is proved with the help of GNY logic.  ...  The "status" field shows authentication status of the nodes present in MANET. The MNT is used to keep record of the malicious nodes detected during node authentication.  ...  Among these logics, the GNY is used to prove correctness of OTNA protocol.  ... 
doi:10.5120/18274-9381 fatcat:rqr3ywddr5bcxjabwjkp5cx7xm

GAP Universal One-Step Authentication Protocol

Xianghao Nan
2021 OALib  
The Truth Logic is realized by digital signature, and proves the entity authenticity by identifier authentication and ontology authentication, forming a new concept of identifier authentication and proves  ...  Both entity authentication and event authentication are based on identifier authentication, so the GAP universal authentication protocol can be constructed to authenticate all entities in the Internet  ...  The logical relationship is that since Alice believes the authenticity of X, Bob also believes the authenticity of X.  ... 
doi:10.4236/oalib.1108061 fatcat:ehrl4vuewrcohaymp2gqgp7pfy

Verification and Analysis of an Improved Authentication Protocol for Mobile IP [chapter]

Qing Gao, Winston Seah, Anthony Lo, Kin-Mun Lye
2000 Broadband Communications  
In this paper, we proposed an authentication protocol for Mobile IP to improve its scalability and efficiency. The protocol was verified and analysed with BAN logic.  ...  However, through discussion, we were able to show that the result does not compromise the security of the protocol.  ...  In order to check the security of the protocol, we adopted the widely used BAN Logic [1] to verify the proposed authentication protocol.  ... 
doi:10.1007/978-0-387-35579-5_22 fatcat:si6bjgqilre4binx62dvzqd2re

Modified Authentication Protocol and Evaluation Tool: Kerberos and BAN Logic

2019 International journal of recent technology and engineering  
For checking the authenticity of messages exchange process in authentication protocols BAN logic is used. The Kerberos encrypt the information for authentications.  ...  Authentication Protocols are one of the same which can provide the authentication, confidentiality & integrity.  ...  The BAN logic tries to verify the authentication protocols by achieving some goals that user had in mind and are the basic goals that must be satisfied for achieving the authenticity of the protocol.  ... 
doi:10.35940/ijrte.c4684.098319 fatcat:4brbkm3oxvaejfr6j2ylthypou

A Comparative Analysis of Tools for Testing the Security Protocols

Reham Abdellatif Abouhogail, Electrical Quantities Metrology Dept. National Institute of standards (NIS), Egypt
2019 International Journal of Information Technology and Computer Science  
In this paper, Analysis and comparison of two popular security verification tools namely Automated Validation of Internet Security Protocols and Applications (AVISPA) and Burrows-Abadi-Needham (BAN) logic  ...  As a case study, two previously proposed security protocols, which were tested before by BAN logic only are evaluated and proved using the automated verification tool AVISPA to ensure that these protocols  ...  When the protocol flawed, the proof of its correctness can't be reached using BAN logic. As a result, some development for the BAN logic was proposed, Like GNY logic [25] and SVO logic [26] .  ... 
doi:10.5815/ijitcs.2019.12.03 fatcat:26a4gqgwvreq5i2yydx3xx6emi

The Modeling and Analysis of the Strong Authentication Protocol for Secure RFID System [chapter]

Hyun-Seok Kim, Jin-Young Choi
2010 Radio Frequency Identification Fundamentals and Applications Bringing Research to Practice  
R cannot derive that ID is valid; The proposed the strong authentication protocol for RFID systems Analysis of the strong authentication protocol using GNY logic In the previous schemes (Weis et al  ...  The process of verification with modal logic The first step in logic-based verification involves specifying the protocol in the language of the logic by expressing each protocol message as a logical formula  ...  The Modeling and Analysis of the Strong Authentication Protocol for Secure RFID System 169 T2 : P ◁ (X, Y) P ◁ X Being told a formula implies being told each of its concatenated components.  ... 
doi:10.5772/7996 fatcat:giavgzzywbcy7lhln3i7g22ytq

An Improved Two-Way Security Authentication Protocol for RFID System

Baolong Liu, Bing Yang, Xiaohao Su
2018 Information  
The correctness of the protocol is proved by using BAN logic analysis.  ...  The correctness of the protocol is proved by using Burrows-Abadi-Needham (BAN) logic analysis.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/info9040086 fatcat:5jbpr2ubnngtleokaaotxh7edu

Automation-Considered Logic of Authentication and Key Distribution [chapter]

Taekyoung Kwon, Seongan Lim
2004 Lecture Notes in Computer Science  
This paper presents an automation-considered logic of authentication for reasoning about principals' belief on authentication and key distribution protocols.  ...  The so-called ASVO logic is based upon the famous SVO logic but designed in the slightly different way that minimizes the protocol idealization needs.  ...  Acknowledgement This work was supported in part by R&D project 2002-S-073 of Korea Information Security Agency.  ... 
doi:10.1007/978-3-540-24591-9_33 fatcat:jd4gj4hshja2hkrvuwwirc767e

Hash based Server/Serverless Adaptive and Mutual Authentication Protocol of RFID

Wang Guowei, Jia Zongpu, Peng Weiping
2015 Open Cybernetics and Systemics Journal  
(RFID) authentication protocols, the paper proposes a Hash function based server/serverless adaptive and mutual authentication protocol of RFID based on the analysis of RFID authentication protocol that  ...  of RFID authentication protocols.  ...  ACKNOWLEDGEMENTS The research of this paper was supported by science and technology key project of Henan province (132102210123) and science and technology key project of education department of Henan  ... 
doi:10.2174/1874110x01509010483 fatcat:7wyxxp7lunfczb5r2w47skqgti
« Previous Showing results 1 — 15 out of 72,394 results