DocumentCode :
3425095
Title :
Interpretation of Binary Strings as Security Protocols for their Evolution by means of Genetic Algorithms
Author :
Zarza, Luis ; Pegueroles, Josep ; Soriano, Miguel
Author_Institution :
Tech. Univ. of Mixteca, Huajuapan de Leon
fYear :
2007
fDate :
3-7 Sept. 2007
Firstpage :
708
Lastpage :
712
Abstract :
The design of cryptographic and security protocols for new scenarios and applications can be computationally expensive. Examples of these can be sensor or mobile ad-hoc networks and electronic voting or auctions applications. In such cases, the aid of an automated tool generating protocols for a predefined problem can be of great utility. This work uses the Genetic Algorithms (GA) techniques for the automatic design of security networked protocols. When using GA for optimizing protocols the genome definition is critical. We discuss how security protocols can be represented as binary strings. Arbitrary criteria can lead to improper strings for our GA tools. We explain and justify the steps to define genome interpretation in our optimization method. Analysis of the proposal attending is also presented as part of our contribution.
Keywords :
cryptographic protocols; genetic algorithms; automated tool generating protocols; binary strings interpretation; cryptographic protocols; genetic algorithms; genome definition; optimization method; optimizing protocols; security networked protocols; security protocols; Ad hoc networks; Algorithm design and analysis; Bioinformatics; Computer applications; Cryptographic protocols; Cryptography; Electronic voting; Genetic algorithms; Genomics; Security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Database and Expert Systems Applications, 2007. DEXA '07. 18th International Workshop on
Conference_Location :
Regensburg
ISSN :
1529-4188
Print_ISBN :
978-0-7695-2932-5
Type :
conf
DOI :
10.1109/DEXA.2007.79
Filename :
4312986
Link To Document :
بازگشت