{"title":"一个改进的密钥分发协议及其BAN分析","authors":"Shi-ying Shi, Yu-ming Mao","doi":"10.1109/ICFCC.2009.78","DOIUrl":null,"url":null,"abstract":"This paper mainly discusses the role of formal analysis in the design of the authentication protocols function; in allusion to Needham-Schroeder Protocol with shared key and Otway-Rees Protocol , this paper propose a new authentication protocol and then analyze it using BAN logic, according to the result of formal analysis, paper show an attack mode to the protocol and point out that formal analysis is helpful for the design of protocol ; Article final discussion this kind of analysis function, limitation as well as improvement direction.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"An Improvement Key Distribution Protocol and Its BAN Analysis\",\"authors\":\"Shi-ying Shi, Yu-ming Mao\",\"doi\":\"10.1109/ICFCC.2009.78\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper mainly discusses the role of formal analysis in the design of the authentication protocols function; in allusion to Needham-Schroeder Protocol with shared key and Otway-Rees Protocol , this paper propose a new authentication protocol and then analyze it using BAN logic, according to the result of formal analysis, paper show an attack mode to the protocol and point out that formal analysis is helpful for the design of protocol ; Article final discussion this kind of analysis function, limitation as well as improvement direction.\",\"PeriodicalId\":338489,\"journal\":{\"name\":\"2009 International Conference on Future Computer and Communication\",\"volume\":\"23 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-04-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 International Conference on Future Computer and Communication\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICFCC.2009.78\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference on Future Computer and Communication","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICFCC.2009.78","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Improvement Key Distribution Protocol and Its BAN Analysis
This paper mainly discusses the role of formal analysis in the design of the authentication protocols function; in allusion to Needham-Schroeder Protocol with shared key and Otway-Rees Protocol , this paper propose a new authentication protocol and then analyze it using BAN logic, according to the result of formal analysis, paper show an attack mode to the protocol and point out that formal analysis is helpful for the design of protocol ; Article final discussion this kind of analysis function, limitation as well as improvement direction.