DocumentCode
3590967
Title
Research of formal design of authentication protocols
Author
Zhou, Yajie ; Guan, Huanmei
Author_Institution
Comput. Sch., Wuhan Univ., Wuhan, China
Volume
3
fYear
2009
Firstpage
25
Lastpage
28
Abstract
Authentication is one of the most important properties in network security, it is usually ensured by designing authentication protocols which use cryptographic techniques. Unfortunately, practice proved that the analysis and design of a protocol is not easy even it is very simple. The paper describes an automatic generation of authentication security protocols based on the evolutionary algorithm and SVO logic and illustrates the approach can automatic generate large-scale authentication protocols, such as three-party key agreement etc.
Keywords
authorisation; cryptographic protocols; evolutionary computation; formal logic; SVO logic; authentication security protocols; cryptographic techniques; evolutionary algorithm; formal design; network security; Authentication; Body sensor networks; Communication system security; Computer networks; Computer security; Cryptographic protocols; Cryptography; Large-scale systems; Logic; Public key;
fLanguage
English
Publisher
ieee
Conference_Titel
Intelligent Computing and Intelligent Systems, 2009. ICIS 2009. IEEE International Conference on
Print_ISBN
978-1-4244-4754-1
Electronic_ISBN
978-1-4244-4738-1
Type
conf
DOI
10.1109/ICICISYS.2009.5358226
Filename
5358226
Link To Document