23
CSE 914 - Michigan State University Extensions of BAN by Heather Goldsby Michelle Pirtle

CSE 914 - Michigan State University Extensions of BAN by Heather Goldsby Michelle Pirtle

  • View
    220

  • Download
    0

Embed Size (px)

Citation preview

CSE 914 - Michigan State University

Extensions of BAN

by

Heather Goldsby

Michelle Pirtle

CSE 914 - Michigan State University

Overview

• BAN Logic – Burrows, Abadi, and Needham• GNY – Gong, Needham, Yahalom• RV• AT – Abadi and Tuttle• VO – van Oorschot• SVO – Syverson and van Oorschot• Wenbo Mao – “Mao”• Comparison• Conclusion

CSE 914 - Michigan State University

BAN Logic – 1989• Goal: Offer a formalization of the description and analysis

of authentication protocols over distributed computer systems– State what is accomplished by the protocol– Allow reasoning about, and comparisons of, protocol assumptions– Draw attention to unnecessary actions that can be removed from a

protocol– Highlight any encrypted messages that could be sent in clear text

• Tool: SPEAR– Model analyzer for BAN Logic and GNY– Developed for security protocols

CSE 914 - Michigan State University

BAN (cont.)• Advantages

– Introduced a simple and powerful notation– Logic postulates (ie. Nonce-verification rule) are straight

forward to apply for deriving BAN beliefs

• Disadvantages– Idealization step can cause analysis problems– No formal syntax or semantics– Does not account for improper encryption– A principal’s beliefs cannot be changed at later stages of the

protocol– Logic limited to analyze authentication protocols– Honesty and trust in other principals is not addressed

Foundation of Each LogicBAN GNY GS AT VO SVO Mao RV

BAN

GNY X

GS X

AT X

VO X X X X

SVO X X X X X

Mao X X X X X X

RV XRead across - States which logic(s) were used to design the new logicRead down - States which logic(s) extended from the logicLogics listed in increasing year of publication

CSE 914 - Michigan State University

GNY - 1990• Goal: Gain ability to analyze more protocols in a more

consistent manner• Extends and reformulates BAN

– Notions are expanded– New rules and constructs– Eliminate some of BAN’s universal assumptions

• Tools: – SPEAR

• Model analyzer for BAN Logic and GNY• Developed for security protocols

– Pattern scanner used as a parser for “not-originated-here” notion

CSE 914 - Michigan State University

GNY (cont.)• Advantages

– Multiple levels of trust can be used in reasoning– More protocols can be analyzed– Making some BAN assumptions explicit allows for

generality

• Disadvantages– R6 is unsound– Combining rules can result in unsound conclusions– The set of rules is incomplete– Some rules have redundant premises

• E.g. I2

CSE 914 - Michigan State University

RV – 1996

• Goal: Provide a logic of belief, based on BAN for use with a theory generator

• Extension of BAN– Explicit interpretation

• Idealization step – Fails to consider other interpretations– Hidden assumptions about safety of message

– Responsibility• Account for principal’s irresponsible behavior

• Tool: RVChecker – Theory Generator

CSE 914 - Michigan State University

RV (cont.)

• Advantages– Maintains the original simplicity of BAN– Has tool support– Addresses principal responsibility and the

idealization step

• Disadvantages– No formal syntax or semantics– Unable to specify full range of protocols

CSE 914 - Michigan State University

AT – 1991

• Goal: Find a natural semantic model for BAN

• Extensions:– Provides formal syntax and semantics– Simplifies existing BAN inference rules– Reformulates inference rules as axioms– Removes need for honesty

CSE 914 - Michigan State University

AT (cont.)

• Advantages– Formal syntax and semantics – Addresses question of principal honesty– More elegant proof system owing to rules of

BAN being rewritten as axioms

• Disadvantages– No tool support – Assumes perfect encryption – Does not address idealization step

CSE 914 - Michigan State University

VO – 1993

• Goal: Extend BAN family of logics in a manner that allows authenticated key agreement protocols to be analyzed, and to better examine goals and beliefs in the protocols.

• Extensions– Refine the BAN construct “shares the good crypto key”

– Define new key confirmation primitive

– Define new postulates for use with reasoning about “jointly established” keys

CSE 914 - Michigan State University

VO (cont.)

• Advantages– Accomplishes analysis of a new set of protocols– Allows for a closer analysis of the goals and

beliefs of the new set of protocols

• Disadvantages– Time is ignored– Message ordering is not addressed

CSE 914 - Michigan State University

SVO – 1994

• Goal: Unification of BAN, GNY, AT, & VO

• Extensions:– Include public keys– New functions – Message comprehensibility

CSE 914 - Michigan State University

SVO (cont.)

• Advantages– Proved to be sound

• Disadvantages– Not suited for tool support

• SVD revamped SVO: developed to be compatible with Isabelle theorem prover

CSE 914 - Michigan State University

Mao – 1995

• Goal: Formalize the idealization step

• Extension:– Rule-based idealization technique– Remove need for perfect encryption assumption

CSE 914 - Michigan State University

Mao (cont.)

• Advantages– Formalization of idealization technique– Eliminates assumption of perfect cryptography

• Disadvantages– No tool support – No proof of soundness for idealization rules

CSE 914 - Michigan State University

Comparison Table Part 1

SyntaxFormal

Semantics

Separation of Semantics and Syntax

Minimize Universal

Assumptions

Increases Number of Protocols

Analyzed AdversaryBAN Logical NO NO - - NO

GNY Logical NO NO YESYES -

Cryptographic NO

RV Logical NO NO NO NO NOAT Formal YES YES NO NO NOVO Logical NO NO YES Yes

SVO Formal YES YES YES NO

Mao Formal YES YES NO NO NO

CSE 914 - Michigan State University

Comparison Table Part 2

Assumes Perfect

Cryptography IdealizationAddress Honesty

Differ Levels of

TrustTool

SupportBAN YES YES NO NO SPEAR

GNY YES

YES - not-originated-

here YES YES

SPEAR, pattern scanner

RV YES

YES - comes up with

interpretation rules

YES - done with legit

rules NO RVCheckerAT YES NO YES NO NOVO YES NO NO YES NO

SVO YES NO NO YES NO

Mao NO YES NO YES NO

CSE 914 - Michigan State University

Conclusions

• BAN gave a very good foundation to expand upon

• BAN-like logics do not need to be limited to authentication protocols

• No one logic can or will cover all aspects of protocol analysis

• More tool support is needed

CSE 914 - Michigan State University

Possible Future Work

• Possible extensions to our work:– Include other BAN-like logics

• Gaarder Snekkenes - GS

• Sigrid Gurgens – SG

• Mao and Boyd

• SVD – An extension of SVO

– Design and develop tool support

CSE 914 - Michigan State University

References• Kindred, "Theory Generation for Security Protocols“. 1999. http://reports-

archive.adm.cs.cmu.edu/anon/1999/CMU-CS-99-130.pdf• Mao, "An Augmentation of BAN-Like Logics“. 1995.

http://www.citeseer.nj.nec.com/mao95augmentation.html• Syverson and van Oorschot, "On unifying some cryptographic protocol

logics“. 1994. http://www.citeseer.nj.nec.com/syverson94unifying.html• M. Abadi and M. Tuttle, "A Semantics for a Logic of Authentication“.

http://www.citeseer.nj.nec.com/article/abadi91semantics.html• Burrows, Abadi & Needham, “A Logic of Authentication”. 1989.

http://citeseer.nj.nec.com/burrows90logic.html• Gong, Needham and Yahalom, "Reasoning About Belief in Cryptographic

Protocols”. 1990. http://citeseer.nj.nec.com/gong90reasoning.html• van Oorschot,”Extending cryptographic logics of belief to key agreement

protocols”. 1993. http://doi.acm.org/10.1145/168588.168617

CSE 914 - Michigan State University

Relationships Among LogicsBAN - 1989

GS - 1991

AT - 1991

GNY - 1990

VO - 1993

SVO - 1994

Mao - 1995

RV - 1996

SG - 1996?