** Next:** Notation
** Up:** Cryptographic protocols
** Previous:** Analyzing cryptographic protocols

##

The Burrows-Abadi-Needham logic

As stated above, the BAN logic is the most popular approach in
analyzing cryptographic protocols. This, and the fact that we will use
the logic later in the thesis, is why we will describe it in more
detail in this section.

*Ronny H Arild*

*1998-11-11*