z-logo
Premium
Automated Design of Security Protocols
Author(s) -
Hao Chen,
Clark John A.,
Jacob Jeremy L.
Publication year - 2004
Publication title -
computational intelligence
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.353
H-Index - 52
eISSN - 1467-8640
pISSN - 0824-7935
DOI - 10.1111/j.0824-7935.2004.00249.x
Subject(s) - computer science , key (lock) , protocol (science) , task (project management) , computer security , cryptographic protocol , cryptography , engineering , medicine , alternative medicine , systems engineering , pathology
Security protocols play an important role in modern communications. However, security protocol development is a delicate task, and experience shows that computer security protocols are notoriously difficult to get right. Recently, Clark and Jacob provided a framework for automatic protocol generation based on combinatorial optimization techniques and the symmetric key part of BAN logic. This paper shows how such an approach can be further developed to encompass the full BAN logic without the loss of efficiency and thereby synthesize public key protocols and hybrid protocols.

This content is not available in your region!

Continue researching here.

Having issues? You can contact us here