Publication Details

The Security Protocol Design Using Genetic Algorithms Paradigms

OČENÁŠEK, P. The Security Protocol Design Using Genetic Algorithms Paradigms. Proceedings of the 11th Conference and Competition STUDENT EEICT 2005. Brno: Faculty of Electrical Engineering and Communication BUT, 2005. p. 576-580. ISBN: 80-214-2890-2.
Czech title
Návrh bezpečnostních protokolů za použití principů genetických algoritmů
Type
conference paper
Language
English
Authors
Keywords

security protocol, design, genetic algorithm, evolutionary approach, verification, formal specification, BAN logic

Abstract

This paper deals with the evolutionary approach for designing security protocols. In the first part, the introduction to security protocols is outlined followed by the explanation of principles of genetic algorithms. The second part presents the algorithm for designing security protocols. The whole design is determined by the genetic evolution. The genetic approach must be connected with the heuristic strategies to satisfy some design expectations. In the addition to the previous work, the idea of automatic designing tool and other directions in the topics research are outlined. The paper relates closely to the topic of the author's PhD thesis.

Published
2005
Pages
576–580
Proceedings
Proceedings of the 11th Conference and Competition STUDENT EEICT 2005
Conference
STUDENT EEICT 2005, Brno, CZ
ISBN
80-214-2890-2
Publisher
Faculty of Electrical Engineering and Communication BUT
Place
Brno
BibTeX
@inproceedings{BUT21452,
  author="Pavel {Očenášek}",
  title="The Security Protocol Design Using Genetic Algorithms Paradigms",
  booktitle="Proceedings of the 11th Conference and Competition STUDENT EEICT 2005",
  year="2005",
  pages="576--580",
  publisher="Faculty of Electrical Engineering and Communication BUT",
  address="Brno",
  isbn="80-214-2890-2"
}
Back to top