This page (revision-1) was last changed on 29-Nov-2024 16:16 by UnknownAuthor

Only authorized users are allowed to rename pages.

Only authorized users are allowed to delete pages.

Page revision history

Version Date Modified Size Author Changes ... Change note

Page References

Incoming links Outgoing links

Version management

Difference between version and

At line 1 added 18 lines
!!! Overview [1]
[{$pagename}] ([BAN logic]) is a set of rules for defining and analyzing information exchange [protocols].
[{$pagename}] helps its users determine whether exchanged information is trustworthy, secured against [eavesdropping|eavesdropper], or both.
[{$pagename}] starts with the assumption that all information exchanges happen on media vulnerable to tampering ([Integrity]) and public [monitoring] ([Confidentiality]). This has evolved into the popular security mantra, "Don't trust the network." ([Zero Trust])
A typical BAN logic sequence includes three steps:
* Verification of message origin
* Verification of message freshness
* Verification of the origin's trustworthiness
[{$pagename}] uses postulates and definitions – like all axiomatic systems – to analyze authentication protocols. Use of the BAN logic often accompanies a security protocol notation formulation of a protocol and is sometimes given in papers.
!! More Information
There might be more information for this subject on one of the following:
[{ReferringPagesPlugin before='*' after='\n' }]
----
* [#1] - [Burrows–Abadi–Needham_logic|Wikipedia:Burrows–Abadi–Needham_logic|target='_blank'] - based on information obtained 2017-12-02-