Analysis of cryptographic protocols using logics of belief: an overview

Authors

  • David Monniaux

DOI:

https://doi.org/10.26636/jtit.2002.4.145

Keywords:

cryptographic protocols, logics of belief, BAN, GNY, decidability

Abstract

When designing a cryptographic protocol or explaining it, one often uses arguments such as ``since this message was signed by machine B, machine A can be sure it came from B`` in informal proofs justifying how the protocol works. Since it is, in such informal proofs, often easy to overlook an essential assumption, such as a trust relation or the belief that a message is not a replay from a previous session, it seems desirable to write such proofs in a formal system. While such logics do not replace the recent techniques of automatic proofs of safety properties, they help in pointing the weaknesses of the system. In this paper, we present briefly the BAN (Burrows-Abadi-Needham) formal system [10, 11] as well as some derivative. We show how to prove some properties of a~simple protocol, as well as detecting undesirable assumptions. We then explain how the manual search for proofs can be made automatic. Finally, we explain how the lack of proper semantics can be a bit worrying.

Downloads

Download data is not yet available.

Downloads

Published

2002-12-30

Issue

Section

ARTICLES FROM THIS ISSUE

How to Cite

[1]
D. Monniaux, “Analysis of cryptographic protocols using logics of belief: an overview”, JTIT, vol. 10, no. 4, pp. 57–67, Dec. 2002, doi: 10.26636/jtit.2002.4.145.