A logic of authentication

M. Burrows, M. Abadi, R. Needham
{"title":"A logic of authentication","authors":"M. Burrows, M. Abadi, R. Needham","doi":"10.1098/rspa.1989.0125","DOIUrl":null,"url":null,"abstract":"Questions of belief are essential in analysing protocols for the authentication of principals in distributed computing systems. In this paper we motivate, set out, and exemplify a logic specifically designed for this analysis: we show how various protocols differ subtly with respect to the required initial assumptions of the participants and their final beliefs. Our formalism has enabled us to isolate and express these differences with a precision that was not previously possible. It has drawn attention to features of protocols of which we and their authors were previously unaware, and allowed us to suggest improvements to the protocols. The reasoning about some protocols has been mechanically verified. This paper starts with an informal account of the problem, goes on to explain the formalism to be used, and gives examples of its application to protocols from the literature, both with shared-key cryptography and with public-key cryptography. Some of the examples are chosen because of their practical importance, whereas others serve to illustrate subtle points of the logic and to explain how we use it. We discuss extensions of the logic motivated by actual practice; for example, to account for the use of hash functions in signatures. The final sections contain a formal semantics of the logic and some conclusions.","PeriodicalId":20605,"journal":{"name":"Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences","volume":"30 1","pages":"233 - 271"},"PeriodicalIF":0.0000,"publicationDate":"1989-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2545","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1098/rspa.1989.0125","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2545

Abstract

Questions of belief are essential in analysing protocols for the authentication of principals in distributed computing systems. In this paper we motivate, set out, and exemplify a logic specifically designed for this analysis: we show how various protocols differ subtly with respect to the required initial assumptions of the participants and their final beliefs. Our formalism has enabled us to isolate and express these differences with a precision that was not previously possible. It has drawn attention to features of protocols of which we and their authors were previously unaware, and allowed us to suggest improvements to the protocols. The reasoning about some protocols has been mechanically verified. This paper starts with an informal account of the problem, goes on to explain the formalism to be used, and gives examples of its application to protocols from the literature, both with shared-key cryptography and with public-key cryptography. Some of the examples are chosen because of their practical importance, whereas others serve to illustrate subtle points of the logic and to explain how we use it. We discuss extensions of the logic motivated by actual practice; for example, to account for the use of hash functions in signatures. The final sections contain a formal semantics of the logic and some conclusions.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
身份验证逻辑
信任问题是分析分布式计算系统中主体认证协议的基本问题。在本文中,我们激发、列出并举例说明了一个专门为这种分析设计的逻辑:我们展示了不同的协议在参与者的初始假设和最终信念方面是如何微妙地不同的。我们的形式主义使我们能够精确地分离和表达这些差异,这在以前是不可能的。它使人们注意到我们和它们的作者以前不知道的协议的特性,并允许我们对协议提出改进建议。一些协议的推理已经得到了机械验证。本文从对该问题的非正式描述开始,接着解释了将要使用的形式主义,并给出了其在文献中的协议应用示例,包括共享密钥加密和公钥加密。选择一些例子是因为它们的实际重要性,而其他例子则是为了说明逻辑的微妙之处,并解释我们如何使用它。我们讨论了由实际实践驱动的逻辑的扩展;例如,考虑签名中散列函数的使用。最后的部分包含逻辑的形式语义和一些结论。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Some examples of Penrose’s quasi-local mass construction The influence of diffusion on the current-voltage curve in a flame ionization detector High strain-rate shear response of polycarbonate and polymethyl methacrylate On the evolution of plane detonations On the solutions of a class of dual integral equations occurring in diffraction problems
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1