Title :
Evaluation Function for Synthesizing Security Protocols by means of Genetic Algorithms
Author :
Zarza, Luis ; Pegueroles, Josep ; Soriano, Miguel
Author_Institution :
Univ. Tecnologica de la Mixteca, Huajuapan de Leon
Abstract :
The design of cryptographic and security protocols for new scenarios and applications can be computationally expensive. Examples of these can be sensor or mobile ad-hoc networks and electronic voting or auctions applications. In such cases, the aid of an automated tool generating protocols for a predefined problem can be of great utility. This work uses the genetic algorithms (GA) techniques for the automatic design of security networked protocols. When using GA for optimizing protocols the evaluation function is critical. We discuss how can be defined several basic criteria for evaluating security protocols and present some examples for evaluation of different protocols
Keywords :
cryptographic protocols; genetic algorithms; cryptographic protocols; genetic algorithm; protocol optimization; security networked protocols; security protocol synthesis; Algorithm design and analysis; Biological information theory; Cryptographic protocols; Cryptography; Data security; Design engineering; Evolution (biology); Genetic algorithms; Genetic engineering; Telematics;
Conference_Titel :
Availability, Reliability and Security, 2007. ARES 2007. The Second International Conference on
Conference_Location :
Vienna
Print_ISBN :
0-7695-2775-2
DOI :
10.1109/ARES.2007.83