1989
DOI: 10.1098/rspa.1989.0125
|View full text |Cite
|
Sign up to set email alerts
|

A logic of authentication

Abstract: Questions of belief are essential in analysing protocols for the authentication of principals in distributed computing systems. In this paper we motivate, set out, and exemplify a logic specifically designed for this analysis: we show how various protocols differ subtly with respect to the required initial assumptions of the participants and their final beliefs. Our formalism has enabled us to isolate and express these differences with a precision that was not previously possible. It has drawn attention to fea… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
281
0

Year Published

2003
2003
2023
2023

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 637 publications
(281 citation statements)
references
References 5 publications
0
281
0
Order By: Relevance
“…it exploits information gathered from one protocol execution into another one, greatly enhancing its competence, and, for instance, cheating about identities. Hence, a clear specification of how protocol executions can be interleaved and of the security properties expected after such concurrent runs are necessary, as recognised for instance in [20].…”
Section: Security Protocols and Their Formalisationmentioning
confidence: 99%
See 1 more Smart Citation
“…it exploits information gathered from one protocol execution into another one, greatly enhancing its competence, and, for instance, cheating about identities. Hence, a clear specification of how protocol executions can be interleaved and of the security properties expected after such concurrent runs are necessary, as recognised for instance in [20].…”
Section: Security Protocols and Their Formalisationmentioning
confidence: 99%
“…This calls for verification models that are grounded on solid formal settings. Considerable success has already been achieved in the past years in approaching security protocol analysis and a variety of formal models and reasoning techniques have been developed to specify and verify their properties, (see [4,10,12,13,20,32,36,42,51,53] to cite a few). Many of these approaches have led to the development of automated verification toolkits.…”
Section: Introduction Motivations and Related Workmentioning
confidence: 99%
“…It seems that many protocols may be subject to the "arity" attack: our methods found that this attack is also possible on the Otway-Rees protocol (see [15] for a detailed description of the protocol and its analysis) and on the Yahalom protocol, as described in [7].…”
Section: Known and New Attacksmentioning
confidence: 99%
“…A seminal paper on logics of authentication is [7]. Work in this area has produced significant results in finding protocol flaws, but also appears to have limitations which will be hard to overcome within the paradigm.…”
Section: Introductionmentioning
confidence: 97%
“…Using these methods, many flaws have been found in published protocols [14]. Most of these methods are based on the so-called Dolev-Yao model [18] -models such as special-purpose logics [12] or complexity theoretic and probabilistic models [7] are not discussed here.…”
Section: Introductionmentioning
confidence: 99%