Abstract
Protocol security is important. So are efficiency and cost. This paper provides an early framework for handling such aspects in a uniform way based on combinatorial optimisation techniques. The belief logic of Burrows, Abadi and Needham BAN logic) is viewed as both a specification and proof system and as a 'protocol programming language'. The paper shows how simulated annealing and genetic algorithms can be used to generate correct and efficient BAN protocols. It also investigates the use of parsimonious and redundant representations. (C) 2001 Elsevier Science B.V. All rights reserved.
Original language | English |
---|---|
Pages (from-to) | 891-904 |
Number of pages | 14 |
Journal | Information and Software Technology |
Volume | 43 |
Issue number | 14 |
Publication status | Published - 15 Dec 2001 |
Keywords
- secure protocols
- belief logic
- simulated annealing
- genetic algorithms