Overview [1]#

Burrows Abadi Needham logic (BAN logic) is a set of rules for defining and analyzing information exchange protocols.

Burrows Abadi Needham logic helps its users determine whether exchanged information is trustworthy, secured against eavesdropping, or both.

Burrows Abadi Needham logic starts with the assumption that all information exchanges happen on media vulnerable to tampering (Integrity) and public monitoring (Confidentiality). This has evolved into the popular security mantra, "Don't trust the network." (Zero Trust)

A typical BAN logic sequence includes three steps:

  • Verification of message origin
  • Verification of message freshness
  • Verification of the origin's trustworthiness
Burrows Abadi Needham logic uses postulates and definitions – like all axiomatic systems – to analyze authentication protocols. Use of the BAN logic often accompanies a security protocol notation formulation of a protocol and is sometimes given in papers.

More Information#

There might be more information for this subject on one of the following:

Add new attachment

Only authorized users are allowed to upload new attachments.
« This page (revision-3) was last changed on 02-Dec-2017 09:11 by jim