Publication Details
The Security Protocol Design Using Genetic Algorithms Paradigms
security protocol, design, genetic algorithm, evolutionary approach, verification, formal specification, BAN logic
This paper deals with the evolutionary approach for designing security protocols. In the first part, the introduction to security protocols is outlined followed by the explanation of principles of genetic algorithms. The second part presents the algorithm for designing security protocols. The whole design is determined by the genetic evolution. The genetic approach must be connected with the heuristic strategies to satisfy some design expectations. In the addition to the previous work, the idea of automatic designing tool and other directions in the topics research are outlined. The paper relates closely to the topic of the author's PhD thesis.
@inproceedings{BUT21452,
author="Pavel {Očenášek}",
title="The Security Protocol Design Using Genetic Algorithms Paradigms",
booktitle="Proceedings of the 11th Conference and Competition STUDENT EEICT 2005",
year="2005",
pages="576--580",
publisher="Faculty of Electrical Engineering and Communication BUT",
address="Brno",
isbn="80-214-2890-2"
}