A Limitation of Ban Logic Analysis on a Man-in-the-middle Attack
Cited by
Export citation
- BibTex
- RIS
- TXT
@Article{JICS-1-131,
author = {},
title = {A Limitation of Ban Logic Analysis on a Man-in-the-middle Attack},
journal = {Journal of Information and Computing Science},
year = {2024},
volume = {1},
number = {3},
pages = {131--138},
abstract = {In recent years a lot of attention has been paid to the use of special logics to analyse cryptographic
protocols, foremost among these being the BAN logic. These logics have been successful in finding
weaknesses in various cryptographic protocols. With BAN logic analysis on a Station-to-Station (STS)
protocol, the paper presents a limitation of BAN logic analysis on a Man-in-the-middle attack, which shows
that it is easy for the BAN logic to approve protocols that are in practice unsound and the some
enhancements of the BAN logic should be made or in some cases, the informal method will be required in
some security protocol analysis like STS. An improved STS protocol against a man-in-the-middle attack is
given in the paper.
},
issn = {1746-7659},
doi = {https://doi.org/},
url = {http://global-sci.org/intro/article_detail/jics/22837.html}
}
TY - JOUR
T1 - A Limitation of Ban Logic Analysis on a Man-in-the-middle Attack
AU -
JO - Journal of Information and Computing Science
VL - 3
SP - 131
EP - 138
PY - 2024
DA - 2024/01
SN - 1
DO - http://doi.org/
UR - https://global-sci.org/intro/article_detail/jics/22837.html
KW - BAN logic, Key Agreement Protocol, Man-in-the-middle Attack, Diffie-Hellman
AB - In recent years a lot of attention has been paid to the use of special logics to analyse cryptographic
protocols, foremost among these being the BAN logic. These logics have been successful in finding
weaknesses in various cryptographic protocols. With BAN logic analysis on a Station-to-Station (STS)
protocol, the paper presents a limitation of BAN logic analysis on a Man-in-the-middle attack, which shows
that it is easy for the BAN logic to approve protocols that are in practice unsound and the some
enhancements of the BAN logic should be made or in some cases, the informal method will be required in
some security protocol analysis like STS. An improved STS protocol against a man-in-the-middle attack is
given in the paper.
. (2024). A Limitation of Ban Logic Analysis on a Man-in-the-middle Attack.
Journal of Information and Computing Science. 1 (3).
131-138.
doi:
Copy to clipboard