Abstract
This paper proposes an evolutionary method that serves for designing security protocols. The principles of security protocols are outlined, followed by the specification of modal logic that is used to encode the belief and knowledge of communicating parties. The second part introduces the evolutionary optimization framework and proposes the techniques that can be used to automatically evolve basic security protocols.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Abadi M., Needham R.: Prudent Engineering Practice for Cryptographic Protocols. In: Proceedings of the 1994 IEEE Symposium on Security and Privacy, IEEE Computer Security Press (1994) p. 122–136
Abadi, M., Tuttle, N.: A Semantic for a Logic of Authentication. In: Proceedings of the ACM Symposium on Principles of Distributed Computing (1991) p. 201–216
Agray, N., van der Hoek, W., de Vink, E.: On BAN Logics for Industrial Security protocols. CCEMAS(2001)p. 8
Burrows M., Abadi M., Needham R.: A Logic of Authentication. ACM Transactions on Computer Systems, 8(1) (1990) p. 18–36
Gritzalis S.: Security protocols over open networks and distributed systems: Formal methods for their Analysis, Design and Verification. University of Aegean, Greece, Computer Communications, 22(8) (1999) p. 695–707
Ma, L., Tsai, J.: Formal Verification Techniques for Computer Communication Security Protocols. Handbook of Software Engineering and Knowledge Engineering, World Scientific Publishing Company (2000) p. 23
Očenášek, P.: On Inductive Approach in Security Protocol Verification. In: Proceedings of the 10th Conference and Competition STUDENT EEICT (2004) Brno, CZ, p. 272–276
Očenášek, P.: The Security Protocol Design Using Genetic Algorithms Paradigms. In: Proceedings of the 11th Conference and Competition STUDENT EEICT (2005) Brno, CZ, p. 576–580
Očenášek, P.: Towards Selected Problems in the Security Protocol Design and Verification. 1st Doctoral Workshop on Mathematical and Engineering Methods in Computer Science MEMICS (2005) Znojmo, CZ, p. 9
Shmatikov, V., Stern, U.: Efficient Finite-State Analysis for Large Security Protocols. In: Proceedings of the 11th IEEE Computer Security Foundation Workshop, IEEE Computer Society Press (1998) p. 10
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag London Limited
About this paper
Cite this paper
Ocenasek, P. (2006). Evolutionary Approach in the Security Protocols Design. In: Blyth, A. (eds) EC2ND 2005. Springer, London. https://doi.org/10.1007/1-84628-352-3_15
Download citation
DOI: https://doi.org/10.1007/1-84628-352-3_15
Publisher Name: Springer, London
Print ISBN: 978-1-84628-311-6
Online ISBN: 978-1-84628-352-9
eBook Packages: Computer ScienceComputer Science (R0)