{"title":"An Improvement Key Distribution Protocol and Its BAN Analysis","authors":"Shi-ying Shi, Yu-ming Mao","doi":"10.1109/ICFCC.2009.78","DOIUrl":null,"url":null,"abstract":"This paper mainly discusses the role of formal analysis in the design of the authentication protocols function; in allusion to Needham-Schroeder Protocol with shared key and Otway-Rees Protocol , this paper propose a new authentication protocol and then analyze it using BAN logic, according to the result of formal analysis, paper show an attack mode to the protocol and point out that formal analysis is helpful for the design of protocol ; Article final discussion this kind of analysis function, limitation as well as improvement direction.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference on Future Computer and Communication","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICFCC.2009.78","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
This paper mainly discusses the role of formal analysis in the design of the authentication protocols function; in allusion to Needham-Schroeder Protocol with shared key and Otway-Rees Protocol , this paper propose a new authentication protocol and then analyze it using BAN logic, according to the result of formal analysis, paper show an attack mode to the protocol and point out that formal analysis is helpful for the design of protocol ; Article final discussion this kind of analysis function, limitation as well as improvement direction.