!!! Overview [1]
[{$pagename}] ([BAN logic]) is a set of rules for defining and analyzing information exchange [protocols].
[{$pagename}] helps its users determine whether exchanged information is trustworthy, secured against [eavesdropping|eavesdropper], or both.
[{$pagename}] starts with the assumption that all information exchanges happen on media vulnerable to tampering ([Integrity]) and public [monitoring] ([Confidentiality]). This has evolved into the popular security mantra, "Don't trust the network." ([Zero Trust])
A typical BAN logic sequence includes three steps:
* Verification of message origin
* Verification of message freshness
* Verification of the origin's trustworthiness
[{$pagename}] uses postulates and definitions – like all axiomatic systems – to analyze authentication protocols. Use of the BAN logic often accompanies a security protocol notation formulation of a protocol and is sometimes given in papers.
!! More Information
There might be more information for this subject on one of the following:
[{ReferringPagesPlugin before='*' after='\n' }]
----
* [#1] - [Burrows–Abadi–Needham_logic|Wikipedia:Burrows–Abadi–Needham_logic|target='_blank'] - based on information obtained 2017-12-02-