DocumentCode
2641269
Title
Automatic Design Approach of Security Protocols Based on Evolutionary Computation
Author
Ya-Jie Zhou ; Wang, Jiacheng ; Jing-wei Zhang
Author_Institution
Comput. Center, Wuhan Univ., Wuhan
fYear
2008
fDate
18-20 June 2008
Firstpage
562
Lastpage
562
Abstract
Security protocols provide the basic guarantee to open network of secure communications, but practice proved that the analysis and design of a protocol is not easy even it is very simple. The paper describes an automatic design approach of network security protocols based on the evolutionary algorithm and BEN logic and illustrates the approach can automatic design large-scale security protocols, such as three-party key agreement etc.
Keywords
cryptographic protocols; evolutionary computation; security of data; telecommunication security; BEN logic; automatic design approach; evolutionary computation; network security protocols; open network; three-party key agreement; Algorithm design and analysis; Authentication; Computer networks; Computer security; Cryptography; Evolutionary computation; Large-scale systems; Logic design; Protocols; Public key;
fLanguage
English
Publisher
ieee
Conference_Titel
Innovative Computing Information and Control, 2008. ICICIC '08. 3rd International Conference on
Conference_Location
Dalian, Liaoning
Print_ISBN
978-0-7695-3161-8
Electronic_ISBN
978-0-7695-3161-8
Type
conf
DOI
10.1109/ICICIC.2008.633
Filename
4603751
Link To Document