On unifying some cryptographic protocol logics

PF Syverson, PC Van Oorschot - Proceedings of 1994 IEEE …, 1994 - ieeexplore.ieee.org
We present a logic for analyzing cryptographic protocols. This logic encompasses a
unification of four of its predecessors in the BAN family of logics, namely those given by Li …

[PDF][PDF] The use of logic in the analysis of cryptographic protocols

P Syverson - … . 1991 IEEE Computer Society Symposium on …, 1991 - researchgate.net
Logics for cryptographic protocol analysis are presented and a study is made of the protocol
features that they are appropriate for analyzing some are appropriate for analyzing trust …

Towards formal analysis of security protocols

W Mao, C Boyd - [1993] Proceedings Computer Security …, 1993 - ieeexplore.ieee.org
The pioneering and well-known work of M. Burrows, M. Abadi and R. Needham (1989),(the
BAN logic) which dominates the area of security protocol analysis is shown to take an …

A unified cryptographic protocol logic

PF Syverson, PC Van Oorschot - NRL Publication, 1996 - apps.dtic.mil
We present a logic for analyzing cryptographic protocols. This logic is based on a unification
of four of its predecessors in the BAN family of logics, namely those given in GNY90, AT91 …

A model of computation for the NRL protocol analyzer

C Meadows - Proceedings The Computer Security Foundations …, 1994 - ieeexplore.ieee.org
We develop a model of computation for the NRL Protocol Analyzer by modifying and
extending the model of computation for Burrows, Abadi, and Needham (BAN) logic (M …

On a limitation of BAN logic

C Boyd, W Mao - Workshop on the Theory and Application of of …, 1993 - Springer
In the past few years a lot of attention has been paid to the use of special logics to analyse
cryptographic protocols, foremost among these being the logic of Burrows, Abadi and …

[PDF][PDF] A critique of the Burrows, Abadi and Needham logic

DM Nessett - ACM SIGOPS Operating Systems Review, 1990 - dl.acm.org
In a recent paper [1], Burrows, Abadi and Needham propose a logic for the analysis of
authentication protocols. Formulated as a collection of notational constructs acted upon by …

Adding time to a logic of authentication

PF Syverson - Proceedings of the 1st ACM Conference on Computer …, 1993 - dl.acm.org
In [BAN89] Burrows, Abadi, and Needham presented a logic (BAN) for analyzing
cryptographic protocols in terms of belief. This logic is quite useful in uncovering flaws in …

A HOL extension of GNY for automatically analyzing cryptographic protocols

SH Brackin - Proceedings 9th IEEE Computer Security …, 1996 - ieeexplore.ieee.org
This paper describes a Higher Order Logic (HOL) theory formalizing an extended version of
the Gong, Needham, Yahalom (GNY) belief logic, a theory used by software that …

Formal methods for the analysis of authentication protocols

AD Rubin, P Honeyman - 1993 - deepblue.lib.umich.edu
In this paper, we examine current approaches and the state of the art in the application of
formal methods to the analysis of cryptographic protocols. We use Meadows' classification of …