A logic of authentication

ACM Transactions on Computer Systems - Tập 8 Số 1 - Trang 18-36 - 1990
Michael T. Burrows1, Martı́n Abadi1, Roger M. Needham2
1Digital Equipment Corp., Palo Alto, CA
2University of Cambridge, Cambridge, UK

Tóm tắt

Authentication protocols are the basis of security in many distributed systems, and it is therefore essential to ensure that these protocols function correctly. Unfortunately, their design has been extremely error prone. Most of the protocols found in the literature contain redundancies or security flaws. A simple logic has allowed us to describe the beliefs of trustworthy parties involved in authentication protocols and the evolution of these beliefs as a consequence of communication. We have been able to explain a variety of authentication protocols formally, to discover subtleties and errors in them, and to suggest improvements. In this paper we present the logic and then give the results of our analysis of four published protocols, chosen either because of their practical importance or because they serve to illustrate our method.

Từ khóa


Tài liệu tham khảo

10.1145/357369.357373

BURROWS , M. , ABADI , M. , AND NEEDHAM , R.M. Authentication : A practical study in belief and action . In Proceedings of the 2nd Conference on Theoretical Aspects of Reasoning about Knowledge (Asilomar, Ca. , Feb. 1988 ) M. Vardi, Ed. Morgan Kaufmann, Los Altos, Calif. , 1988, pp. 325 - 342 . BURROWS, M., ABADI, M., AND NEEDHAM, R.M. Authentication: A practical study in belief and action. In Proceedings of the 2nd Conference on Theoretical Aspects of Reasoning about Knowledge (Asilomar, Ca., Feb. 1988) M. Vardi, Ed. Morgan Kaufmann, Los Altos, Calif., 1988, pp. 325-342.

BURROWS , M. , ABADI , M. , AND NEEDHAM , R.M. A logic of authentication. Rep. 39 , Digital Equipment Corporation Systems Research Center , Palo Alto , Calif., Feb. 1989 . BURROWS, M., ABADI, M., AND NEEDHAM, R.M. A logic of authentication. Rep. 39, Digital Equipment Corporation Systems Research Center, Palo Alto, Calif., Feb. 1989.

CCITT. CCITT draft recommendation X.509. The directory-authentication framework, version 7 . CCITT , Gloucester , Nov. 1987 . CCITT. CCITT draft recommendation X.509. The directory-authentication framework, version 7. CCITT, Gloucester, Nov. 1987.

DEMILLO , R. A. , LYNCH , N. A. , AND MERRITT , M.J. Cryptographic protocols . In Proceedings o/the 14th ACM Symposium on the Theory of Computing ( San Francisco , May 1982 ), ACM, New York, 1982, pp. 383 - 400 . 10.1145/800070.802214 DEMILLO, R. A., LYNCH, N. A., AND MERRITT, M.J. Cryptographic protocols. In Proceedings o/the 14th ACM Symposium on the Theory of Computing (San Francisco, May 1982), ACM, New York, 1982, pp. 383-400. 10.1145/800070.802214

10.1145/358722.358740

DOLEV , D. , AND YAO , A.C. On the security of public key protocols. IEEE Trans. Inf. Theory IT-29 , 2 ( Mar. 1983 ), 198 - 208 . DOLEV, D., AND YAO, A.C. On the security of public key protocols. IEEE Trans. Inf. Theory IT-29, 2 (Mar. 1983), 198-208.

HALPERN , J. Y. , AND MOSES , Y. O. Knowledge and common knowledge in a distributed environment . In Proceedings of the 3rd A CM Conference on the Principles of Distributed Computing ( Vancouver, British Columbia , Aug. 1984 ), ACM, New York, 1984, pp. 480 - 490 . 10.1145/800222.806735 HALPERN, J. Y., AND MOSES, Y. O. Knowledge and common knowledge in a distributed environment. In Proceedings of the 3rd A CM Conference on the Principles of Distributed Computing (Vancouver, British Columbia, Aug. 1984), ACM, New York, 1984, pp. 480-490. 10.1145/800222.806735

HALPERN , J. Y. , MOSES , Y. 0., AND TUTTLE , M. R. A knowledge-based analysis of zero knowledge (preliminary report) . In Proceedings of the 20th ACM Symposium on Theory of Computing ( Chicago, Ill. , May 1988 ), ACM, New York, 1988, pp. 132 - 147 . 10.1145/62212.62224 HALPERN, J. Y., MOSES, Y. 0., AND TUTTLE, M. R. A knowledge-based analysis of zero knowledge (preliminary report). In Proceedings of the 20th ACM Symposium on Theory of Computing (Chicago, Ill., May 1988), ACM, New York, 1988, pp. 132-147. 10.1145/62212.62224

10.1145/363235.363259

MERRITT M. J. AND WOLPER P.L. States of knowledge in cryptographic protocols. Draft. MERRITT M. J. AND WOLPER P.L. States of knowledge in cryptographic protocols. Draft.

10.1109/TSE.1987.233151

MILLER , S. P. , NEUMAN , C. , SCHILLER , J. I. , AND SALTZER , J.H. Kerberos authentication and authorization system . In Project Athena Technical Plan, Sect. E.2.1. MIT , Cambridge , Mass ., July 1987 . MILLER, S. P., NEUMAN, C., SCHILLER, J. I., AND SALTZER, J.H. Kerberos authentication and authorization system. In Project Athena Technical Plan, Sect. E.2.1. MIT, Cambridge, Mass., July 1987.

National Bureau of Standards. Data encryption standard. Fed. Inf. Process. Stand. Publ. 46 . National Bureau of Standards , Washington, D.C. , Jan. 1977 . National Bureau of Standards. Data encryption standard. Fed. Inf. Process. Stand. Publ. 46. National Bureau of Standards, Washington, D.C., Jan. 1977.

10.1145/359657.359659

10.1145/24592.24594

10.1145/359340.359342

10.1145/65000.65002

10.1145/356909.356913