StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Nobody downloaded yet

A Logic of Authentication - Coursework Example

Comments (0) Cite this document
Summary
This work called "A Logic of Authentication" describes Burrows, Abadi, Need-ham (BAN) logic, various security protocols. From this work, it is clear that authentication protocols functioned correctly and more efficiently after the implementation of such logic. The author outlines the role of epistemology and logic…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER92.9% of users find it useful
A Logic of Authentication
Read TextPreview

Extract of sample "A Logic of Authentication"

Download file to see previous pages Borrows, Abadi, and Needham take four published protocols into account, in order to show how they illustrate the appropriateness of this logical method of analysis. But how sound is the logic that they are proposing? How far can a vague and ambiguous logic take us? This paper aims to introduce the famous BAN (Borrows, Abadi, and Needham) logic and it’s used on one of the published protocols (i.e. Kerberos), to discuss the logic’s success, its successors, and to review the critiques made on the logic.
This paper is based on the article ”A Logic of Authentication” published in 1989 by the authors Michael Burrows, Martin Abadi, and Roger Needham, University of Cambridge. The paper was nominated for publication in TOCS by the Program Committee for the ACM SIGOPS Symposium on Operating Systems Principles, December 1989. The three authors completed part of this work at Digital Equipment Corporation and part of the University of Cambridge.
The BAN Logic is named after Burrows, Abadi, and Needham. The logic is, as they stated, a logic of belief and action. It contains no logical inversions; therefore it cannot be used to prove that a protocol is flawed. But when proof, that a protocol is correct, cannot be obtained, that protocol deserves to be treated with suspicion. In other words BAN logic does not aim to prove the security of a protocol; it can only catch certain kinds of subtle errors, help us to reason about the protocol, and help us identify and formalize our assumptions and analysis. Details of the BAN logic such as the idealization of protocol transactions, along with the various inference rules, will be discussed in the later sections. The authors of ”A Logic of Authentication” introduce the BAN logic to protocol designers whom they believe are inappropriately copying available techniques; thus coming up with protocols containing many security flows. The authors explain the basic notation of the logic and five rules that are applied to analyze protocols. Afterward, they move on to actually idealize different existing protocols to conclude that such a simple logic can capture subtle differences between protocols. If there is one thing that the authors forgot to mention, that would be the basic definitions of frequently used terms. So in this paper, I will try my best to define those terms. ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(A Logic of Authentication Coursework Example | Topics and Well Written Essays - 4000 words - 1, n.d.)
A Logic of Authentication Coursework Example | Topics and Well Written Essays - 4000 words - 1. https://studentshare.org/information-technology/1750419-ban-a-logic-of-authentication
(A Logic of Authentication Coursework Example | Topics and Well Written Essays - 4000 Words - 1)
A Logic of Authentication Coursework Example | Topics and Well Written Essays - 4000 Words - 1. https://studentshare.org/information-technology/1750419-ban-a-logic-of-authentication.
“A Logic of Authentication Coursework Example | Topics and Well Written Essays - 4000 Words - 1”. https://studentshare.org/information-technology/1750419-ban-a-logic-of-authentication.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF A Logic of Authentication

Authentication Methods and Techniques

...A Logic of Authentication... A Logic of Authentication... Authentication Methods and Techniques Table of Contents Introduction 3 2.Authentication Techniques and Methods 4 A.Authentication by Knowledge 4 a.Passwords / PINs 4 b.Challenge Response 5 B.Authentication by Possession 6 a.Hardware Tokens 6 b.Software Tokens 7 c.Digital Certificates on Smart Cards 7 C.Authentication by Property 8 3.Risk Assessment 9 a.Maintaining a Balance 10 b.Multi-Factor Authentication 10 c.Applying the Risk Assessment 11 d.Usability of System 12 4.Conclusion 12 5.References 14 1. Introduction Authentication is one of the vital steps involved in providing access control (Tipton & Nozaki, 2011). Authentication is the process through which a system verifies whether a...
10 Pages(2500 words)Research Paper

BAN - A Logic of Authentication

...), to discuss the logic’s success, its successors, and to review the critiques made on the logic. This paper is based on the article ”A Logic of Authentication” published in 1989 by the authors Michael Burrows, Martin Abadi and Roger Needham, University of Cambridge. The paper was nominated for publication in TOCS by the Program Committee for the ACM SIGOPS Symposium on Operating Systems Principles, December 1989. The three authors completed part of this work at Digital Equipment Corporation and part at the University of Cambridge. 2 Chapter 2 Introduction In this chapter a brief introduction to the basic principles of the BAN logic is discussed as well as a short section about security protocols. 2.1 An Introduction to Borrows, Abadi, Need...
9 Pages(2250 words)Essay

Biometric Authentication

...A Logic of Authentication... A Logic of Authentication... Biometric Authentication (Insert Introduction The era that we live in is computer centered. This means that almost everything, if not everything, relies on some computer technology to operate. The number of accounts that an individual operates are increasing by the day and consequently, so are the passwords that grant access to these websites and accounts. However, this does not guarantee safety for the individual’s property and data simply because of the rising number of identity theft cases and data disclosure cases. IT developers have therefore designed several technology software which authenticate or grant an individual access to an account by virtue of a physical character such as a...
7 Pages(1750 words)Essay

Biometric Authentication

...A Logic of Authentication... A Logic of Authentication... Authentication Use Context Provided people require security for their critical assets, which has proven to be an uphill task in the contemporary society, dedicated biometric solution (DBS) will play a vital role in ensuring the same. DBS is essential in the enforcement of law, monetary services, provision of healthcare, as well as boundary management operations. DBS remains a complex system of identification that utilizes diverse methods of authentication, including fingerprint, hand, and face, in provision of the highest security levels without requisition of one’s PIN (personal identification number) or ID (identity card). One’s fingerprint, hand, or face recognition senses such specifi...
7 Pages(1750 words)Essay

Logic

...A Logic of Authentication... Religious Extremism “Many Africans are concerned about religious extremism, including within their own faith. Indeed, many Muslims say they are more concerned about Muslim extremism than about Christian extremism, and Christians in four countries say they are more concerned about Christian extremism than about Muslim extremism.” (The Pew Forum on Religion & Public Life, POLL April 15, 2010, a Project of the Pew Research Centre) The Project The survey on religious beliefs and its effect on social and political order, undertaken in the Sub-Saharan Africa has been supported by grants from The Pew Charitable Trusts and the John Templeton Foundation as part of the Pew-Templeton Global Religious Futures Project, which a...
5 Pages(1250 words)Assignment

Logic

...A Logic of Authentication... Is anthropogenic climate change (what used to be known as "global warming a problem that needs immediate and/or long term attention Introduction Anthropogenic climate change or global warming happens due to the greenhouse gas emitted from earth due to the activity of the human beings. Scientist by observing the polar ice melt has reached to a conclusion that green house gas emitted by earth is increasing from past few hundred years. Many studies reveal that the potent green house gas has increased after the post industrial period. The potent green house gas consisted of carbon did – oxide, nitrous oxide and methane. The significant increase in greenhouse is studies and results shows that this phenomenon is solely...
7 Pages(1750 words)Research Paper

Biometric Authentication

...A Logic of Authentication... A Logic of Authentication... Authentication (Insert Biometric Authentication The era that we live in is computer centered meaning that almost everything, if not everything, relies on some computer technology to operate. The number of accounts that an individual operates are increasing by the day and consequently, so are the passwords that grant access to these websites and accounts. However, this does not guarantee safety for the individual’s property and data simply because of the rising number of identity theft cases and data disclosure cases. IT developers have therefore designed several technology software which authenticate or grant an ...
7 Pages(1750 words)Essay

Biometric Authentication

...A Logic of Authentication... A Logic of Authentication... of the Viability of Biometric Authentication For Online Transactions Presented By: Computer Sciences and Information Technology Lecturer’s Name Institution’s Name Location Date 1. Viability of biometric authentication methods for online transactions Biometric Authentication is generally a more secure means of optimizing data security on online transaction as it minimizes the risk of impersonation and identity theft. In essence, biometric identification implies that the owners of the information are present in person as it identifies unique features such as eyesight, fingerprint, and voice data (Oezcan 2003, p. 11). Unlike password and signatures which are easily stolen by third parties, bio...
2 Pages(500 words)Essay

Logic

...A Logic of Authentication... Logic CATEGORICAL PROPOSITIONS Temporary workers are not eligible for fringe benefits. Translation: No temporary workers qualify for fringe benefits. Letter designation: B Quantity: Universal Quality: Negative Distribution of terms: Subject and predicate are both distributed. 2) Not all guilt feelings are psychological aberrations. Translation: Some guilty feelings are psychological aberrations. Letter designation: B Quantity: Non-universal Quality: Negative. Distribution of terms: Subject is not distributed, predicate is distributed. 3) Some television shows that depict violence incite violence. Translation: Not all television shows that depict violence incite violence. Letter designation: A Quantity: Universal Qu...
2 Pages(500 words)Assignment

Biometrics Authentication in E-exams

...A Logic of Authentication... A Logic of Authentication... Authentication in E-exams 1. Abstract E-learning is a great opportunity for the modern man. It needs to be coupled with efficient and reliable security mechanisms so that this medium can be established as a dependable one. Authentication of e-exam takers is of prime importance so that exams are given by fair means. A new approach shall be proposed to ensure that no unauthorized individuals are allowed to give the exams. 2. Overview With the advent of computer technology; our lives have changed and given them a new dimension. World Wide Web is also one of the inventions of the computer technology that has changed the mode of communication and information for humans. A new concept t...
8 Pages(2000 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Coursework on topic A Logic of Authentication for FREE!

Contact Us