Automated design of security protocols

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Security protocols play an important role in modern communications. However, security protocol development is a delicate task, and experience shows that computer security protocols are notoriously difficult to get right. Recently, Clark and Jacob provided a framework for automatic protocol generation based on combinatorial optimization techniques and the symmetric key part of BAN logic. This paper shows how such an approach can be further developed to encompass the full BAN logic without loss of efficiency and thereby synthesize public key protocols and hybrid protocols.

Original languageEnglish
Title of host publicationCEC: 2003 CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1-4, PROCEEDINGS
Place of PublicationNEW YORK
PublisherIEEE
Pages2181-2188
Number of pages8
ISBN (Print)0-7803-7804-0
Publication statusPublished - 2003
EventCongress on Evolutionary Computation (CEC) - Canberra
Duration: 8 Dec 200312 Dec 2003

Conference

ConferenceCongress on Evolutionary Computation (CEC)
CityCanberra
Period8/12/0312/12/03

Cite this