期刊文献+

一种密钥协商协议的自动化设计方法

An Automated Design Method for Key Assignment Protocol
原文传递
导出
摘要 通过引入优胜劣汰的自然规律,提出了一种改进的基于演化计算的安全协议自动化设计方法.该方法采用SVO逻辑作为描述协议的基本工具,给出了能全面衡量安全协议个体性能的评估函数,并据此理论设计出一种满足安全目标的密钥协商协议,保证了最终生成协议为最优解.实验结果显示:由于在协议生成过程中,同时进行了该协议的安全验证,能很好地保证所涉及协议的正确性和安全性,表明该方法具有较强的可行性和适用性. By introducing of the natural law of survival of the fittest,an improved method of automatically designing cryptographic protocols is proposed.This method applies SVO logic as a basic tool to describe protocols,constructs a fitness function to assess the performance of individuals systematically and designs a key agreement protocol to meet the corresponding objectives for security.The result shows that: as the generation,the protocol has been verified concurrently when it is generated,to ensure its correctness and security.So the method has a strong feasibility and applicability.
出处 《武汉大学学报(理学版)》 CAS CSCD 北大核心 2009年第1期89-92,共4页 Journal of Wuhan University:Natural Science Edition
基金 国家高技术研究发展计划(863)项目(2008AA01Z404) 国家自然科学基金(90718006,60743003) 教育部博士点基金(20070486107)资助项目
关键词 安全协议 演化计算 自动化设计 SVO逻辑 security protocol evolutionary computing automated design SVO logic
  • 相关文献

参考文献9

  • 1Perrig A,Song D. A First Step towards the Automatic Generation of Security Protocols[C]//Proceeding of Network and Distributed System Security Symposium, NDSS 2000. San Diego : Internet Society, 2000 : 21- 22.
  • 2Randy H. Automatic Design of Network Security Protocols [D]. Ann Arbor: University of Michigan, 2002.
  • 3Clark J A,Jacob J L. Searching for a Solution: Engineering Tradeoffs and the Evolution of Provably Secure Protocols[ C ]/ / Proceedings of IEEE Symposium on Research in Security and Privacy. Berkeley: IEEE Computer Social Press, 2000 : 82-95.
  • 4Ocenasek P,Sveda M. An Approach to Automated Design of Security Protocols[C]//International Conference on Mobile Communications and Learning Technologies, 2006 : 77.
  • 5Dong Ling,Chen Kefei,Wen Mi,et al. Protocol Engineering Principles for Cryptographic Protocols Design [C]//Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing. New York : IEEE Computer Society Press,2007 : 641-646.
  • 6Clark J A,Jacob J L . Protocols are Programs too.. the Meta-Heuristic Search for Security Protocols [J]. Information and Software Technology, 2001,43 (14) : 891-904.
  • 7Clark J A. Meta-Heuristic Search as a Cryptological Tool[D]. Toronto: University of York, 2001.
  • 8Chen H,Clark J A,Jacob J. Automatic Design of Security Protocols[C ] / / Con f erence on Evolutionary Computation 2003, Special Session on Computer Security. New York: IEEE Computer Society Press, 2003:2181- 2188.
  • 9Syverson P F,Oorschot P C. On Unifying some Cryptographic Protocol Logics[ C]/ / IEEE Computer Society Symposium on Research in Security and Privacy. Alamitos : IEEE Computer Society Press, 1994 : 14-28.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部