DESIGN OF CRYPTOGRAPHIC PROTOCOLS BY MEANS OF GENETIC ALGORITHMS TECHNIQUES

Luis Zarza, Josep Pegueroles, Miguel Soriano, Rafael Martínez

2006

Abstract

Genetic algorithms techniques are broadly accepted as an easy way to solve optimization problems. They provide, in a reasonable time, optimal or near-to-the-optimal solutions to problems involving a large amount of variables and entries. In this work we present Genetic Algorithms as a tool aiding the design of security protocols. The design process is divided in the following steps: a population consisting in a set of protocols is established; the population evolves according the benefits criteria programmed in the evolution process. The mapping of valid protocol messages to individuals in a population and the election of proper genetic algorithm evolution mechanisms are presented as key items in the whole process. All proposals in this work have been implemented in a software tool including basic features as cryptographic protocols design using public key and symmetric cryptography. Results achieved with simple examples confirm our expectations and point as future work the development of new versions including advanced features.

References

  1. Holland, J 1975, Adaptation in natural and artificial systems, University of Michigan Press, Michigan.
  2. Koza, J 1995, 'Survey of genetic algorithms and genetic programming', Proceedings of the WESCON'95, pp. 589-594
  3. Srinivas, M, & Patnaik, L 1994, 'Genetic algorithms : a survey', IEEE Computer, pp. 17-26.
  4. Pavel, O 2005, 'The security protocol design using genetic algorithms', Preceedings in the 11th Conference and Competition STUDENT EEICT, vol., no., pp. 576-580.
  5. Hao, C, Clark, J & Jacob J 2004, 'Automated design of security protocols'. Computational Inteligence, vol. 20, no. 3.
  6. Burrows, M, Abadi, M & Needham, R 1990, 'A logic of authentication', ACM Transactions on Computer Systems, vol. 8, no. 1, pp. 18-36.
  7. Brackin, S, Meadows, C & Millen, J 1999, 'CAPSL interface for the NRL protocol analyzer', Proceedings of ASSETT99.
Download


Paper Citation


in Harvard Style

Zarza L., Pegueroles J., Soriano M. and Martínez R. (2006). DESIGN OF CRYPTOGRAPHIC PROTOCOLS BY MEANS OF GENETIC ALGORITHMS TECHNIQUES . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006) ISBN 978-972-8865-63-4, pages 316-319. DOI: 10.5220/0002102003160319


in Bibtex Style

@conference{secrypt06,
author={Luis Zarza and Josep Pegueroles and Miguel Soriano and Rafael Martínez},
title={DESIGN OF CRYPTOGRAPHIC PROTOCOLS BY MEANS OF GENETIC ALGORITHMS TECHNIQUES},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006)},
year={2006},
pages={316-319},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002102003160319},
isbn={978-972-8865-63-4},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006)
TI - DESIGN OF CRYPTOGRAPHIC PROTOCOLS BY MEANS OF GENETIC ALGORITHMS TECHNIQUES
SN - 978-972-8865-63-4
AU - Zarza L.
AU - Pegueroles J.
AU - Soriano M.
AU - Martínez R.
PY - 2006
SP - 316
EP - 319
DO - 10.5220/0002102003160319