Automated Design of Non-Repudiation Security Protocols

This paper proposes an approach of automated design of non-repudiation security protocols from the abstract level that uses logic-based rules. The search strategy adopts the genetic algorithm which is a meta-heuristic search method. During the searching process, some counter measures against flaws of security protocols are added to assess the candidate protocols. Therefore candidate protocols can guarantee some security properties. In the past, security protocols are mostly designed manually which depends on the experiences and skills of experts. The automated design method of security protocol alleviates the burden of designing security protocols, and guides the designer to get a fast and better security protocols.

[1]  John A. Clark,et al.  Automated Design of Security Protocols , 2004, Comput. Intell..

[2]  Martín Abadi,et al.  A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.

[3]  Paul Syverson,et al.  Fail-Stop Protocols: An Approach to Designing Secure Protocols (Preprint) , 1995 .

[4]  Panagiotis Louridas Some guidelines for non-repudiation protocols , 2000, CCRV.

[5]  John A. Clark,et al.  Protocols are programs too: the meta-heuristic search for security protocols , 2001, Inf. Softw. Technol..

[6]  John A. Clark,et al.  Searching for a solution: engineering tradeoffs and the evolution of provably secure protocols , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[7]  John C. Mitchell,et al.  A meta-notation for protocol analysis , 1999, Proceedings of the 12th IEEE Computer Security Foundations Workshop.

[8]  David E. Goldberg,et al.  Genetic Algorithms in Search Optimization and Machine Learning , 1988 .

[9]  D. E. Goldberg,et al.  Genetic Algorithms in Search , 1989 .

[10]  Simon N. Foley,et al.  Fast automatic synthesis of security protocols using backward search , 2003, FMSE '03.

[11]  Dawn Xiaodong Song,et al.  A First Step Towards the Automatic Generation of Security Protocols , 2000, NDSS.