A search-based approach to the automated design of security protocols

Research output: Book/ReportOther report


Security protocols play an important role in modern communications. However,
security protocol development is a delicate task; experience shows that computer security protocols are notoriously difficult to get right. Recently, Clark and Jacob provided a framework for automatic protocol generation based on combinatorial optimisation techniques and the symmetric key part of BAN logic. This paper shows how such an approach can be further developed to encompass the full BAN logic without loss of efficiency and thereby synthesise public key protocols and hybrid protocols.
Original languageEnglish
PublisherDepartment of Computer Science, University of York
Number of pages102
VolumeYork Computer Science Technical Report
Publication statusPublished - 2004

Publication series

NameYork Computer Science Technical Report Series ("Yellow Reports")
PublisherDepartment of Computer Science, University of York

Bibliographical note

Freely available already.


  • Metaheuristic Search
  • Authentication protocols
  • Automatic synthesis
  • Simulated annealing
  • Genetic Algorithms
  • Protocols library

Cite this