On the Properties of Epistemic and Temporal Epistemic Logics of Authentication
Author(s) -
Sharar Ahmadi,
Mehran S. Fallah,
Massoud Pourmahdian
Publication year - 2019
Publication title -
informatica
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.172
H-Index - 34
eISSN - 1854-3871
pISSN - 0350-5596
DOI - 10.31449/inf.v43i2.1617
Subject(s) - soundness , completeness (order theory) , computer science , authentication (law) , epistemology , protocol (science) , construct (python library) , authentication protocol , computer security , mathematics , philosophy , medicine , mathematical analysis , alternative medicine , pathology , programming language
The authentication properties of a security protocol are specified based on the knowledge gained by the principals that exchange messages with respect to the steps of that protocol. As there are many successful attacks on authentication protocols, different formal systems, in particular epistemic and temporal epistemic logics, have been developed for analyzing such protocols. However, such logics may fail to detect some attacks. To promote the specification and verification power of these logics, researchers may try to construct them in such a way that they preserve some properties such as soundness, completeness, being omniscience-free, or expressiveness. The aim of this paper is to provide an overview of the epistemic and temporal epistemic logics which are applied in the analysis of authentication protocols to find out how far these logical properties may affect analyzing such protocols.
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom