身份验证逻辑

M. Burrows, M. Abadi, R. Needham
{"title":"身份验证逻辑","authors":"M. Burrows, M. Abadi, R. Needham","doi":"10.1098/rspa.1989.0125","DOIUrl":null,"url":null,"abstract":"Questions of belief are essential in analysing protocols for the authentication of principals in distributed computing systems. In this paper we motivate, set out, and exemplify a logic specifically designed for this analysis: we show how various protocols differ subtly with respect to the required initial assumptions of the participants and their final beliefs. Our formalism has enabled us to isolate and express these differences with a precision that was not previously possible. It has drawn attention to features of protocols of which we and their authors were previously unaware, and allowed us to suggest improvements to the protocols. The reasoning about some protocols has been mechanically verified. This paper starts with an informal account of the problem, goes on to explain the formalism to be used, and gives examples of its application to protocols from the literature, both with shared-key cryptography and with public-key cryptography. Some of the examples are chosen because of their practical importance, whereas others serve to illustrate subtle points of the logic and to explain how we use it. We discuss extensions of the logic motivated by actual practice; for example, to account for the use of hash functions in signatures. The final sections contain a formal semantics of the logic and some conclusions.","PeriodicalId":20605,"journal":{"name":"Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences","volume":"30 1","pages":"233 - 271"},"PeriodicalIF":0.0000,"publicationDate":"1989-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2545","resultStr":"{\"title\":\"A logic of authentication\",\"authors\":\"M. Burrows, M. Abadi, R. Needham\",\"doi\":\"10.1098/rspa.1989.0125\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Questions of belief are essential in analysing protocols for the authentication of principals in distributed computing systems. In this paper we motivate, set out, and exemplify a logic specifically designed for this analysis: we show how various protocols differ subtly with respect to the required initial assumptions of the participants and their final beliefs. Our formalism has enabled us to isolate and express these differences with a precision that was not previously possible. It has drawn attention to features of protocols of which we and their authors were previously unaware, and allowed us to suggest improvements to the protocols. The reasoning about some protocols has been mechanically verified. This paper starts with an informal account of the problem, goes on to explain the formalism to be used, and gives examples of its application to protocols from the literature, both with shared-key cryptography and with public-key cryptography. Some of the examples are chosen because of their practical importance, whereas others serve to illustrate subtle points of the logic and to explain how we use it. We discuss extensions of the logic motivated by actual practice; for example, to account for the use of hash functions in signatures. The final sections contain a formal semantics of the logic and some conclusions.\",\"PeriodicalId\":20605,\"journal\":{\"name\":\"Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences\",\"volume\":\"30 1\",\"pages\":\"233 - 271\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1989-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2545\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1098/rspa.1989.0125\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1098/rspa.1989.0125","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2545

摘要

信任问题是分析分布式计算系统中主体认证协议的基本问题。在本文中,我们激发、列出并举例说明了一个专门为这种分析设计的逻辑:我们展示了不同的协议在参与者的初始假设和最终信念方面是如何微妙地不同的。我们的形式主义使我们能够精确地分离和表达这些差异,这在以前是不可能的。它使人们注意到我们和它们的作者以前不知道的协议的特性,并允许我们对协议提出改进建议。一些协议的推理已经得到了机械验证。本文从对该问题的非正式描述开始,接着解释了将要使用的形式主义,并给出了其在文献中的协议应用示例,包括共享密钥加密和公钥加密。选择一些例子是因为它们的实际重要性,而其他例子则是为了说明逻辑的微妙之处,并解释我们如何使用它。我们讨论了由实际实践驱动的逻辑的扩展;例如,考虑签名中散列函数的使用。最后的部分包含逻辑的形式语义和一些结论。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A logic of authentication
Questions of belief are essential in analysing protocols for the authentication of principals in distributed computing systems. In this paper we motivate, set out, and exemplify a logic specifically designed for this analysis: we show how various protocols differ subtly with respect to the required initial assumptions of the participants and their final beliefs. Our formalism has enabled us to isolate and express these differences with a precision that was not previously possible. It has drawn attention to features of protocols of which we and their authors were previously unaware, and allowed us to suggest improvements to the protocols. The reasoning about some protocols has been mechanically verified. This paper starts with an informal account of the problem, goes on to explain the formalism to be used, and gives examples of its application to protocols from the literature, both with shared-key cryptography and with public-key cryptography. Some of the examples are chosen because of their practical importance, whereas others serve to illustrate subtle points of the logic and to explain how we use it. We discuss extensions of the logic motivated by actual practice; for example, to account for the use of hash functions in signatures. The final sections contain a formal semantics of the logic and some conclusions.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信