Skip to main content
Book cover

EC2ND 2005 pp 147–156Cite as

Evolutionary Approach in the Security Protocols Design

  • Conference paper

Abstract

This paper proposes an evolutionary method that serves for designing security protocols. The principles of security protocols are outlined, followed by the specification of modal logic that is used to encode the belief and knowledge of communicating parties. The second part introduces the evolutionary optimization framework and proposes the techniques that can be used to automatically evolve basic security protocols.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abadi M., Needham R.: Prudent Engineering Practice for Cryptographic Protocols. In: Proceedings of the 1994 IEEE Symposium on Security and Privacy, IEEE Computer Security Press (1994) p. 122–136

    Google Scholar 

  2. Abadi, M., Tuttle, N.: A Semantic for a Logic of Authentication. In: Proceedings of the ACM Symposium on Principles of Distributed Computing (1991) p. 201–216

    Google Scholar 

  3. Agray, N., van der Hoek, W., de Vink, E.: On BAN Logics for Industrial Security protocols. CCEMAS(2001)p. 8

    Google Scholar 

  4. Burrows M., Abadi M., Needham R.: A Logic of Authentication. ACM Transactions on Computer Systems, 8(1) (1990) p. 18–36

    Article  Google Scholar 

  5. Gritzalis S.: Security protocols over open networks and distributed systems: Formal methods for their Analysis, Design and Verification. University of Aegean, Greece, Computer Communications, 22(8) (1999) p. 695–707

    Google Scholar 

  6. Ma, L., Tsai, J.: Formal Verification Techniques for Computer Communication Security Protocols. Handbook of Software Engineering and Knowledge Engineering, World Scientific Publishing Company (2000) p. 23

    Google Scholar 

  7. Očenášek, P.: On Inductive Approach in Security Protocol Verification. In: Proceedings of the 10th Conference and Competition STUDENT EEICT (2004) Brno, CZ, p. 272–276

    Google Scholar 

  8. Očenášek, P.: The Security Protocol Design Using Genetic Algorithms Paradigms. In: Proceedings of the 11th Conference and Competition STUDENT EEICT (2005) Brno, CZ, p. 576–580

    Google Scholar 

  9. Očenášek, P.: Towards Selected Problems in the Security Protocol Design and Verification. 1st Doctoral Workshop on Mathematical and Engineering Methods in Computer Science MEMICS (2005) Znojmo, CZ, p. 9

    Google Scholar 

  10. Shmatikov, V., Stern, U.: Efficient Finite-State Analysis for Large Security Protocols. In: Proceedings of the 11th IEEE Computer Security Foundation Workshop, IEEE Computer Society Press (1998) p. 10

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag London Limited

About this paper

Cite this paper

Ocenasek, P. (2006). Evolutionary Approach in the Security Protocols Design. In: Blyth, A. (eds) EC2ND 2005. Springer, London. https://doi.org/10.1007/1-84628-352-3_15

Download citation

  • DOI: https://doi.org/10.1007/1-84628-352-3_15

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-84628-311-6

  • Online ISBN: 978-1-84628-352-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics