!!! Overview [1]
[{$pagename}] ([BAN logic]) is a set of rules for defining and analyzing information exchange [protocols]. 

[{$pagename}] helps its users determine whether exchanged information is trustworthy, secured against [eavesdropping|eavesdropper], or both. 

[{$pagename}] starts with the assumption that all information exchanges happen on media vulnerable to tampering ([Integrity]) and public [monitoring] ([Confidentiality]). This has evolved into the popular security mantra, "Don't trust the network." ([Zero Trust])

A typical BAN logic sequence includes three steps:
* Verification of message origin 
* Verification of message freshness 
* Verification of the origin's trustworthiness 
[{$pagename}] uses postulates and definitions – like all axiomatic systems – to analyze authentication protocols. Use of the BAN logic often accompanies a security protocol notation formulation of a protocol and is sometimes given in papers.

!! More Information
There might be more information for this subject on one of the following:
[{ReferringPagesPlugin before='*' after='\n' }]
----
* [#1] - [Burrows–Abadi–Needham_logic|Wikipedia:Burrows–Abadi–Needham_logic|target='_blank'] - based on information obtained 2017-12-02-