Burrows–Abadi–Needham logic

Burrows–Abadi–Needham logic (also known as the BAN logic) is a set of rules for defining and analyzing information exchange protocols. Specifically, BAN logic helps its users determine whether exchanged information is trustworthy, secured against eavesdropping, or both. BAN logic starts with the assumption that all information exchanges happen on media vulnerable to tampering and public monitoring. This has evolved into the popular security mantra, "Don't trust the network."

A typical BAN logic sequence includes three steps:[1]

  1. Verification of message origin
  2. Verification of message freshness
  3. Verification of the origin's trustworthiness.

BAN logic uses postulates and definitions – like all axiomatic systems – to analyze authentication protocols. Use of the BAN logic often accompanies a security protocol notation formulation of a protocol and is sometimes given in papers.

Language type

BAN logic, and logics in the same family, are decidable: there exists an algorithm taking BAN hypotheses and a purported conclusion, and that answers whether or not the conclusion is derivable from the hypotheses. The proposed algorithms use a variant of magic sets.[2]

Alternatives and criticism

BAN logic inspired many other similar formalisms, such as GNY logic. Some of these try to repair one weakness of BAN logic: the lack of a good semantics with a clear meaning in terms of knowledge and possible universes. However, starting in the mid-1990s, crypto protocols were analyzed in operational models (assuming perfect cryptography) using model checkers, and numerous bugs were found in protocols that were "verified" with BAN logic and related formalisms. [citation needed] In some cases a protocol was reasoned as secure by the BAN analysis but were in fact insecure.[3] This has led to the abandonment of BAN-family logics in favor of proof methods based on standard invariance reasoning. [citation needed]

Basic rules

The definitions and their implications are below (P and Q are network agents, X is a message, and K is an encryption key):

  • P believes X: P acts as if X is true, and may assert X in other messages.
  • P has jurisdiction over X: P's beliefs about X should be trusted.
  • P said X: At one time, P transmitted (and believed) message X, although P might no longer believe X.
  • P sees X: P receives message X, and can read and repeat X.
  • {X}K: X is encrypted with key K.
  • fresh(X): X has not previously been sent in any message.
  • key(K, PQ): P and Q may communicate with shared key K

The meaning of these definitions is captured in a series of postulates:

  • If P believes key(K, PQ), and P sees {X}K, then P believes (Q said X)
  • If P believes (Q said X) and P believes fresh(X), then P believes (Q believes X).

P must believe that X is fresh here. If X is not known to be fresh, then it might be an obsolete message, replayed by an attacker.

  • If P believes (Q has jurisdiction over X) and P believes (Q believes X), then P believes X
  • There are several other technical postulates having to do with composition of messages. For example, if P believes that Q said X, Y, the concatenation of X and Y, then P also believes that Q said X, and P also believes that Q said Y.

Using this notation, the assumptions behind an authentication protocol can be formalized. Using the postulates, one can prove that certain agents believe that they can communicate using certain keys. If the proof fails, the point of failure usually suggests an attack which compromises the protocol.

BAN logic analysis of the Wide Mouth Frog protocol

A very simple protocol – the Wide Mouth Frog protocol – allows two agents, A and B, to establish secure communications, using a trusted authentication server, S, and synchronized clocks all around. Using standard notation the protocol can be specified as follows:

AS: A, {TA, KAB, B}KAS
SB: {TS, KAB, A}KBS

Agents A and B are equipped with keys KAS and KBS, respectively, for communicating securely with S. So we have assumptions:

A believes key(KAS, AS)
S believes key(KAS, AS)
B believes key(KBS, BS)
S believes key(KBS, BS)

Agent A wants to initiate a secure conversation with B. It therefore invents a key, KAB, which it will use to communicate with B. A believes that this key is secure, since it made up the key itself:

A believes key(KAB, AB)

B is willing to accept this key, as long as it is sure that it came from A:

B believes (A has jurisdiction over key(K, AB))

Moreover, B is willing to trust S to accurately relay keys from A:

B believes (S has jurisdiction over (A believes key(K, AB)))

That is, if B believes that S believes that A wants to use a particular key to communicate with B, then B will trust S and believe it also.

The goal is to have

B believes key(KAB, AB)

A reads the clock, obtaining the current time t, and sends the following message:

1 AS: {t, key(KAB, AB)}KAS

That is, it sends its chosen session key and the current time to S, encrypted with its private authentication server key KAS.

Since S believes that key(KAS, AS), and S sees {t, key(KAB, AB)}KAS, then S concludes that A actually said {t, key(KAB, AB)}. (In particular, S believes that the message was not manufactured out of whole cloth by some attacker.)

Since the clocks are synchronized, we can assume

S believes fresh(t)

Since S believes fresh(t) and S believes A said {t, key(KAB, AB)}, S believes that A actually believes that key(KAB, AB). (In particular, S believes that the message was not replayed by some attacker who captured it at some time in the past.)

S then forwards the key to B:

2 SB: {t, A, A believes key(KAB, AB)}KBS

Because message 2 is encrypted with KBS, and B believes key(KBS, BS), B now believes that S said {t, A, A believes key(KAB, AB)}. Because the clocks are synchronized, B believes fresh(t), and so fresh(A believes key(KAB, AB)). Because B believes that S's statement is fresh, B believes that S believes that (A believes key(KAB, AB)). Because B believes that S is authoritative about what A believes, B believes that (A believes key(KAB, AB)). Because B believes that A is authoritative about session keys between A and B, B believes key(KAB, AB). B can now contact A directly, using KAB as a secret session key.

Now let's suppose that we abandon the assumption that the clocks are synchronized. In that case, S gets message 1 from A with {t, key(KAB, AB)}, but it can no longer conclude that t is fresh. It knows that A sent this message at some time in the past (because it is encrypted with KAS) but not that this is a recent message, so S doesn't believe that A necessarily wants to continue to use the key KAB. This points directly at an attack on the protocol: An attacker who can capture messages can guess one of the old session keys KAB. (This might take a long time.) The attacker then replays the old {t, key(KAB, AB)} message, sending it to S. If the clocks aren't synchronized (perhaps as part of the same attack), S might believe this old message and request that B use the old, compromised key over again.

The original Logic of Authentication paper (linked below) contains this example and many others, including analyses of the Kerberos handshake protocol, and two versions of the Andrew Project RPC handshake (one of which is defective).

References

  1. ^ "Course material on BAN logic" (PDF). UT Austin CS.
  2. ^ Monniaux, David (1999). "Decision procedures for the analysis of cryptographic protocols by logics of belief". Proceedings of the 12th IEEE Computer Security Foundations Workshop. pp. 44–54. doi:10.1109/CSFW.1999.779761. ISBN 0-7695-0201-6. S2CID 11283134.
  3. ^ Boyd, Colin; Mao, Wenbo (1994). "On a limitation of BAN logic". EUROCRYPT '93: Workshop on the theory and application of cryptographic techniques on Advances in cryptology. pp. 240–247. ISBN 9783540576006. Retrieved 2016-10-12.

Further reading

Read other articles:

Komando Resor Militer 051/WijayakartaLambang Korem 051/WijayakartaDibentuk29 Oktober 1998Negara IndonesiaCabangTNI Angkatan DaratTipe unitKorem Tipe APeranSatuan TeritorialBagian dariKodam JayaMakoremCikarang, Jawa BaratJulukanKorem 051/WKTPelindungTentara Nasional IndonesiaBaret H I J A U Ulang tahun29 OktoberTokohDanremBrigadir Jenderal TNI Riyanto, S.I.P.Kepala StafKolonel Inf. Yuri Elias Mamahi Komando Resor Militer 051/Wijayakarta, disingkat (Korem 051/WKT) merupakan Korem...

 

يفتقر محتوى هذه المقالة إلى الاستشهاد بمصادر. فضلاً، ساهم في تطوير هذه المقالة من خلال إضافة مصادر موثوق بها. أي معلومات غير موثقة يمكن التشكيك بها وإزالتها. (ديسمبر 2018) بطولة أوروبا تحت 21 سنة لكرة قدم الصالاتأسست2008المنطقةأوروبا (يويفا)عدد الفرق55 (التصفيات)8 (النهائيا)البطل ...

 

SMA Negeri 37 JakartaInformasiDidirikan15 Januari 1975 (sebagai SMA Negeri 8 Filial Jakarta) 13 September 1978 (sebagai SMA Negeri 37 Jakarta)[1]Nomor Statistik Sekolah301016301003Nomor Pokok Sekolah Nasional20102213Kepala SekolahDrs. Mukhlis, M.Ikom.KurikulumKurikulum MerdekaAlamatLokasiJalan H Barat No. 40, Kebon Baru, Tebet, Jakarta Selatan, DKI Jakarta, IndonesiaTel./Faks.+62 (21) 8296058Situs web[1]MotoMotoSekolahku Ibadahku Sekolah Menengah Atas Negeri 37 Jakarta adala...

Not to be confused with Xiang'an, Xiamen. State-level new area in Hebei, People's Republic of ChinaXiong'an New Area 雄安新区State-level new areaBusiness and Service Convention Center Xiong'an in Rongcheng CountyLocation of Xiong'an New Area in HebeiXiong'an New AreaLocation in HebeiShow map of HebeiXiong'an New AreaXiong'an New Area (Northern China)Show map of Northern ChinaXiong'an New AreaXiong'an New Area (China)Show map of ChinaCoordinates: 39°02′55″N 115°54′13″E / ...

 

密西西比州 哥伦布城市綽號:Possum Town哥伦布位于密西西比州的位置坐标:33°30′06″N 88°24′54″W / 33.501666666667°N 88.415°W / 33.501666666667; -88.415国家 美國州密西西比州县朗兹县始建于1821年政府 • 市长罗伯特·史密斯 (民主党)面积 • 总计22.3 平方英里(57.8 平方公里) • 陸地21.4 平方英里(55.5 平方公里) • ...

 

Hitler posing for pictures with his staff, 1940 Adolf Hitler, dictator of Germany from 1933 to 1945, employed a personal staff, which represented different branches and offices throughout his political career.[1] He maintained a group of aides-de-camp and adjutants, including Martin Bormann's younger brother Albert in the National Socialist Motor Corps (NSKK), Friedrich Hoßbach of the Wehrmacht, who was sacked for unfavourable conduct, and Fritz Darges of the Schutzstaffel (SS), who...

Anelacomune(IT) Anela(SC) Anèla Anela – Veduta LocalizzazioneStato Italia Regione Sardegna Provincia Sassari AmministrazioneSindacoGiangiuseppe Nurra (lista civica) dal 13-6-2022 TerritorioCoordinate40°26′40″N 9°03′29″E / 40.444444°N 9.058056°E40.444444; 9.058056 (Anela)Coordinate: 40°26′40″N 9°03′29″E / 40.444444°N 9.058056°E40.444444; 9.058056 (Anela) Altitudine446 m s.l.m. Superficie36,89 km...

 

Suburb of Paisley, Renfrewshire, Scotland, UK For the album by Stealers Wheel, see Ferguslie Park (album). This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these template messages) The neutrality of this article is disputed. Relevant discussion may be found on the talk page. Please do not remove this message until conditions to do so are met. (February 2015) (Learn how and when to remove this message) This article...

 

1961 international treaty For other conventions signed in Vienna, see Vienna Convention. Vienna Convention on Diplomatic RelationsRatifications of the convention   Parties   Non-partiesSigned18 April 1961LocationViennaEffective24 April 1964ConditionRatification by 22 statesSignatories61[1]Parties193[1] (as of June 2021)DepositaryUN Secretary-GeneralLanguagesChinese, English, French, Russian and SpanishFull text Vienna Convention on Diplomatic Relations at W...

  لمعانٍ أخرى، طالع بلقيس (توضيح). بلقيس (بالعبرية: מלכת שְׁבָא)‏  ملكة مملكة سبأ الملكة بلقيس، مخطوطة من القرن الخامس عشر، موجودة في مكتبة الولاية والجامعة غوتنغن. معلومات شخصية الميلاد القرن 10 ق.م  تاريخ الوفاة القرن 10 ق.م  الإقامة مملكة سبأ  العشير سليمان ...

 

Questa voce sull'argomento calciatori panamensi è solo un abbozzo. Contribuisci a migliorarla secondo le convenzioni di Wikipedia. Segui i suggerimenti del progetto di riferimento. Luis MejiaNazionalità Panama Altezza191 cm Peso75 kg Calcio RuoloPortiere Squadra Nacional CarrieraGiovanili 2006-2007 Tauro2008-2009 Fénix Squadre di club1 2006-2008 Tauro5 (-?)2008-2010 Fénix? (-?)2010→  Maiorca B? (-?)2010-2011 Fénix13 (-18)2011→  Tolos...

 

Venezuela at the Games of the XXXII Olympiad in Tokyo Sporting event delegationVenezuela at the2020 Summer OlympicsIOC codeVENNOCVenezuelan Olympic CommitteeWebsitecov.com.ve (in Spanish)in Tokyo, JapanJuly 23, 2021 (2021-07-23) – August 8, 2021 (2021-08-08)Competitors44 in 14 sportsFlag bearer (opening)Antonio Díaz[a]Flag bearer (closing)Antonio DíazMedalsRanked 46th Gold 1 Silver 3 Bronze 0 Total 4 Summer Olympics appearances (ov...

Giōrgos KaragkounīsKaragounis con la maglia della Nazionale grecaNazionalità Grecia Altezza176 cm Peso76 kg Calcio RuoloAllenatore (ex centrocampista) Termine carriera29 giugno 2014 - giocatore CarrieraSquadre di club1 1995-1996 Panathīnaïkos1 (0)1996-1998→  Apollōn Smyrnīs55 (9)1998-2003 Panathīnaïkos118 (25)2003-2005 Inter21 (0)2005-2007 Benfica45 (3)2007-2012 Panathīnaïkos111 (8)[1]2012-2014 Fulham39 (1) Nazionale 1996-1999 Greci...

 

League of Ireland 1944-1945 Competizione League of Ireland Sport Calcio Edizione 24ª Organizzatore FAI Luogo  Irlanda Partecipanti 8 Cronologia della competizione 1943-44 1945-46 Manuale La stagione 1944-1945 è stata la ventiquattresima edizione della League of Ireland, massimo livello professionistico del calcio irlandese. Indice 1 Classifica finale 1.1 Verdetti 2 Statistiche 2.1 Squadre 2.2 Capocannoniere 3 Note Classifica finale Classifica finale 1944-1945 Pt G V N P GF GS DR 1. &#...

 

Nueva Zelanda en los Juegos Olímpicos Bandera de Nueva ZelandaCódigo COI NZLCON Comité Olímpico de Nueva Zelanda(pág. web)Juegos Olímpicos de Seúl 1988Deportistas 83 en 16 deportesAbanderado Ian FergusonMedallasPuesto: 18 3 2 8 13 Historia olímpicaJuegos de verano 1920 • 1924 • 1928 • 1932 • 1936 • 1948 • 1952 • 1956 • 1960 • 1964 • 1968 • 1972 • 197...

Anna Piaggi durante un evento moda Maria Piaggi, detta Anna (Milano, 22 marzo 1931 – Milano, 7 agosto 2012[1]) è stata una giornalista, scrittrice, traduttrice e socialite italiana. Famosa per i suoi articoli apparsi sulla rivista di moda Vogue, nella rubrica da lei curata D.P. Doppie Pagine di Anna Piaggi, divenne celebre anche per aver utilizzato il concetto di vintage prima che venisse coniato il termine.[2] Lo stile di Anna Piaggi oltre l'eccentrico e la sua creatività...

 

هذه المقالة يتيمة إذ تصل إليها مقالات أخرى قليلة جدًا. فضلًا، ساعد بإضافة وصلة إليها في مقالات متعلقة بها. (مارس 2016) عبد القادر اللباوي معلومات شخصية اسم الولادة عبد القادر بن إبراهيم اللباوي الميلاد 18 ديسمبر 1968 (العمر 55 سنة)تالة، ولاية القصرين الجنسية تونسية الحياة العملية...

 

Empress of Austria from 1816 to 1835 This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.Find sources: Caroline Augusta of Bavaria – news · newspapers · books · scholar · JSTOR (March 2009) (Learn how and when to remove this message) Caroline Augusta of BavariaCrown Princess of WürttembergPortrait by Franz Schrotzberg, 1864E...

Emperor of Ethiopia from 1414 to 1429 Yesehaq I ቀዳማዊ ዓፄ ይሥሐቅEmperor of EthiopiaReign23 June 1414 – 1429PredecessorTewodros ISuccessorAndreyasDynastyHouse of SolomonFatherDawit IReligionEthiopian Orthodox This article's lead section may be too short to adequately summarize the key points. Please consider expanding the lead to provide an accessible overview of all important aspects of the article. (March 2022) Yeshaq I (Ge'ez: ይሥሐቅ), throne name: Gabra Masqal II (G...

 

Russian Revisionist Zionist leader (1880–1940) Ze'ev JabotinskyВладимир Жаботинскийזאב זשאַבאָטינסקי‎MBEJabotinsky in 1935BornVladimir Yevgenyevich Zhabotinsky(1880-10-17)17 October 1880[1]Odessa, Russian Empire[2]Died3 August 1940(1940-08-03) (aged 59)[3]Hunter, New York, U.S.Resting place 1940–1964: New Montefiore Cemetery, New York, U.S. 1964–present: Mt. Herzl, Jerusalem 31°46′26″N 35°10′50″E / ...