arrow
Volume 1, Issue 3
A Limitation of Ban Logic Analysis on a Man-in-the-middle Attack

J. Info. Comput. Sci. , 1 (2006), pp. 131-138.

Export citation
  • Abstract
In recent years a lot of attention has been paid to the use of special logics to analyse cryptographic protocols, foremost among these being the BAN logic. These logics have been successful in finding weaknesses in various cryptographic protocols. With BAN logic analysis on a Station-to-Station (STS) protocol, the paper presents a limitation of BAN logic analysis on a Man-in-the-middle attack, which shows that it is easy for the BAN logic to approve protocols that are in practice unsound and the some enhancements of the BAN logic should be made or in some cases, the informal method will be required in some security protocol analysis like STS. An improved STS protocol against a man-in-the-middle attack is given in the paper.
  • AMS Subject Headings

  • Copyright

COPYRIGHT: © Global Science Press

  • Email address
  • BibTex
  • RIS
  • TXT
@Article{JICS-1-131, author = {}, title = {A Limitation of Ban Logic Analysis on a Man-in-the-middle Attack}, journal = {Journal of Information and Computing Science}, year = {2024}, volume = {1}, number = {3}, pages = {131--138}, abstract = {In recent years a lot of attention has been paid to the use of special logics to analyse cryptographic protocols, foremost among these being the BAN logic. These logics have been successful in finding weaknesses in various cryptographic protocols. With BAN logic analysis on a Station-to-Station (STS) protocol, the paper presents a limitation of BAN logic analysis on a Man-in-the-middle attack, which shows that it is easy for the BAN logic to approve protocols that are in practice unsound and the some enhancements of the BAN logic should be made or in some cases, the informal method will be required in some security protocol analysis like STS. An improved STS protocol against a man-in-the-middle attack is given in the paper. }, issn = {1746-7659}, doi = {https://doi.org/}, url = {http://global-sci.org/intro/article_detail/jics/22837.html} }
TY - JOUR T1 - A Limitation of Ban Logic Analysis on a Man-in-the-middle Attack AU - JO - Journal of Information and Computing Science VL - 3 SP - 131 EP - 138 PY - 2024 DA - 2024/01 SN - 1 DO - http://doi.org/ UR - https://global-sci.org/intro/article_detail/jics/22837.html KW - BAN logic, Key Agreement Protocol, Man-in-the-middle Attack, Diffie-Hellman AB - In recent years a lot of attention has been paid to the use of special logics to analyse cryptographic protocols, foremost among these being the BAN logic. These logics have been successful in finding weaknesses in various cryptographic protocols. With BAN logic analysis on a Station-to-Station (STS) protocol, the paper presents a limitation of BAN logic analysis on a Man-in-the-middle attack, which shows that it is easy for the BAN logic to approve protocols that are in practice unsound and the some enhancements of the BAN logic should be made or in some cases, the informal method will be required in some security protocol analysis like STS. An improved STS protocol against a man-in-the-middle attack is given in the paper.
. (2024). A Limitation of Ban Logic Analysis on a Man-in-the-middle Attack. Journal of Information and Computing Science. 1 (3). 131-138. doi:
Copy to clipboard
The citation has been copied to your clipboard