Searching for a solution: Engineering tradeoffs and the evolution of provably secure protocols

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Tradeoffs are an important part of engineering security. Protocol security is important. So are efficiency and cost. This paper provides an early framework for handling such aspects in a uniform way based on combinatorial optimisation techniques. BAN logic is viewed as both a specification and proof system and as a 'protocol programming language' The paper shows how evolutionary search in the form of genetic algorithms can be utilised to 'grow' correct and efficient BAN protocols and shows hour goals and assumptions can co-evolve, effectively engaging in 'specification synthesis'.

Original languageEnglish
Title of host publication2000 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS
Place of PublicationLOS ALAMITOS
PublisherIEEE Computer Society
Pages82-95
Number of pages14
ISBN (Print)0-7695-0665-8
Publication statusPublished - 2000
Event2000 IEEE Symposium on Security and Privacy (S - BERKELEY
Duration: 14 May 200017 May 2000

Conference

Conference2000 IEEE Symposium on Security and Privacy (S
CityBERKELEY
Period14/05/0017/05/00

Cite this