Home

About

Advanced Search

Browse by Discipline

Scientific Societies

E-print Alerts

Add E-prints

E-print Network
FAQHELPSITE MAPCONTACT US


  Advanced Search  

 
The Scope of a Logic of Authentication Michael Burrows \Lambda Mart'in Abadi \Lambda Roger Needham y
 

Summary: The Scope of a Logic of Authentication
Michael Burrows \Lambda Mart'in Abadi \Lambda Roger Needham y
February 9, 1990
\Lambda Digital Equipment Corporation, Systems Research Center
y Computer Laboratory, University of Cambridge
1

1 A Logic of Authentication
Authentication protocols are both essential to security in distributed systems
and notoriously obscure. A typical authentication protocol involves only
two or three parties (called principals) and a few messages between them
(see [1, 10, 13, 14, 15, 16, 19] for example). The intended outcome is that the
parties obtain a guarantee that they are dealing with each other. In addition,
the parties sometimes acquire a new shared secret, such as a session key. The
exchanges are brief, but many of the authentication protocols found in the
literature contain serious security flaws ([1, 10, 14, 19] for example).
The logic of authentication described in the first part of this report has
helped us in analyzing certain aspects of authentication protocols. Our logic
consists of a simple set of inference rules, in a notation designed specifically
for the study of authentication protocols. 1 The goal of the logic is to de­

  

Source: Abadi, Martín - Department of Computer Science, University of California at Santa Cruz

 

Collections: Computer Technologies and Information Sciences