On a limitation of BAN logic

57Citations
Citations of this article
77Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In the past few years a lot of attention has been paid to the use of special logics to analyse cryptographic protocols, foremost among these being the logic of Burrows, Abadi and Needham (the BAN logic). These logics have been successful in finding weaknesses in various examples. In this paper a limitation of the BAN logic is illustrated with two examples. These show that it is easy for the BAN logic to approve protocols that are in practice unsound.

Cite

CITATION STYLE

APA

Boyd, C., & Mao, W. (1994). On a limitation of BAN logic. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 765 LNCS, pp. 240–247). Springer Verlag. https://doi.org/10.1007/3-540-48285-7_20

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free