• DocumentCode
    2641269
  • Title

    Automatic Design Approach of Security Protocols Based on Evolutionary Computation

  • Author

    Ya-Jie Zhou ; Wang, Jiacheng ; Jing-wei Zhang

  • Author_Institution
    Comput. Center, Wuhan Univ., Wuhan
  • fYear
    2008
  • fDate
    18-20 June 2008
  • Firstpage
    562
  • Lastpage
    562
  • Abstract
    Security protocols provide the basic guarantee to open network of secure communications, but practice proved that the analysis and design of a protocol is not easy even it is very simple. The paper describes an automatic design approach of network security protocols based on the evolutionary algorithm and BEN logic and illustrates the approach can automatic design large-scale security protocols, such as three-party key agreement etc.
  • Keywords
    cryptographic protocols; evolutionary computation; security of data; telecommunication security; BEN logic; automatic design approach; evolutionary computation; network security protocols; open network; three-party key agreement; Algorithm design and analysis; Authentication; Computer networks; Computer security; Cryptography; Evolutionary computation; Large-scale systems; Logic design; Protocols; Public key;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Innovative Computing Information and Control, 2008. ICICIC '08. 3rd International Conference on
  • Conference_Location
    Dalian, Liaoning
  • Print_ISBN
    978-0-7695-3161-8
  • Electronic_ISBN
    978-0-7695-3161-8
  • Type

    conf

  • DOI
    10.1109/ICICIC.2008.633
  • Filename
    4603751