next up previous contents
Next: Notation Up: Cryptographic protocols Previous: Analyzing cryptographic protocols

The Burrows-Abadi-Needham logic

As stated above, the BAN logic is the most popular approach in analyzing cryptographic protocols. This, and the fact that we will use the logic later in the thesis, is why we will describe it in more detail in this section.


Ronny H Arild