Burrows Abadi Needham logic helps its users determine whether exchanged information is trustworthy, secured against eavesdropping, or both.
Burrows Abadi Needham logic starts with the assumption that all information exchanges happen on media vulnerable to tampering (Integrity) and public monitoring (Confidentiality). This has evolved into the popular security mantra, "Don't trust the network." (Zero Trust)
A typical BAN logic sequence includes three steps:
- Verification of message origin
- Verification of message freshness
- Verification of the origin's trustworthiness