By the same authors

A search-based approach to the automated design of security protocols

Research output: Book/ReportOther report

Full text download(s)

Author(s)

Department/unit(s)

Publication details

DatePublished - 2004
Number of pages102
PublisherDepartment of Computer Science, University of York
VolumeYork Computer Science Technical Report
EditionYCS-2004-376
Original languageEnglish

Publication series

NameYork Computer Science Technical Report Series ("Yellow Reports")
PublisherDepartment of Computer Science, University of York
No.YCS-2004-376
VolumeYCS

Abstract

Security protocols play an important role in modern communications. However,
security protocol development is a delicate task; experience shows that computer security protocols are notoriously difficult to get right. Recently, Clark and Jacob provided a framework for automatic protocol generation based on combinatorial optimisation techniques and the symmetric key part of BAN logic. This paper shows how such an approach can be further developed to encompass the full BAN logic without loss of efficiency and thereby synthesise public key protocols and hybrid protocols.

Bibliographical note

Freely available already.

    Research areas

  • Metaheuristic Search, Authentication protocols, Automatic synthesis, Simulated annealing, Genetic Algorithms, Protocols library

Discover related content

Find related publications, people, projects, datasets and more using interactive charts.

View graph of relations