Abstract
Security protocols play an important role in modern communications. However,
security protocol development is a delicate task; experience shows that computer security protocols are notoriously difficult to get right. Recently, Clark and Jacob provided a framework for automatic protocol generation based on combinatorial optimisation techniques and the symmetric key part of BAN logic. This paper shows how such an approach can be further developed to encompass the full BAN logic without loss of efficiency and thereby synthesise public key protocols and hybrid protocols.
security protocol development is a delicate task; experience shows that computer security protocols are notoriously difficult to get right. Recently, Clark and Jacob provided a framework for automatic protocol generation based on combinatorial optimisation techniques and the symmetric key part of BAN logic. This paper shows how such an approach can be further developed to encompass the full BAN logic without loss of efficiency and thereby synthesise public key protocols and hybrid protocols.
Original language | English |
---|---|
Publisher | Department of Computer Science, University of York |
Number of pages | 102 |
Volume | York Computer Science Technical Report |
Edition | YCS-2004-376 |
Publication status | Published - 2004 |
Publication series
Name | York Computer Science Technical Report Series ("Yellow Reports") |
---|---|
Publisher | Department of Computer Science, University of York |
No. | YCS-2004-376 |
Volume | YCS |
Bibliographical note
Freely available already.Keywords
- Metaheuristic Search
- Authentication protocols
- Automatic synthesis
- Simulated annealing
- Genetic Algorithms
- Protocols library