!!! Overview [1] [{$pagename}] ([BAN logic]) is a set of rules for defining and analyzing information exchange [protocols]. [{$pagename}] helps its users determine whether exchanged information is trustworthy, secured against [eavesdropping|eavesdropper], or both. [{$pagename}] starts with the assumption that all information exchanges happen on media vulnerable to tampering ([Integrity]) and public [monitoring] ([Confidentiality]). This has evolved into the popular security mantra, "Don't trust the network." ([Zero Trust]) A typical BAN logic sequence includes three steps: * Verification of message origin * Verification of message freshness * Verification of the origin's trustworthiness [{$pagename}] uses postulates and definitions – like all axiomatic systems – to analyze authentication protocols. Use of the BAN logic often accompanies a security protocol notation formulation of a protocol and is sometimes given in papers. !! More Information There might be more information for this subject on one of the following: [{ReferringPagesPlugin before='*' after='\n' }] ---- * [#1] - [Burrows–Abadi–Needham_logic|Wikipedia:Burrows–Abadi–Needham_logic|target='_blank'] - based on information obtained 2017-12-02-