automatic verification of authentication protocols using genetic programming
پایان نامه
- وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان
- نویسنده حسن طه
- استاد راهنما بهروز ترک لادانی
- تعداد صفحات: ۱۵ صفحه ی اول
- سال انتشار 1389
چکیده
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the system. many methods have been used to verify the cryptographic protocols such as logical, algebraic, inductive, and mathematical complexity methods. each of these methods has its special shortages, in addition to the general disadvantages of these methods. nevertheless, no one has tried to use the computational methods as cryptographic protocol’s verifiers. in this thesis, we represent genetic programming – a type of computational methods- as a new verification method for the cryptographic protocols. gaprover; new genetic programming based system has been built and successfully used to verify some known authentication protocols. we wish a new horizon would be opened in the field of cryptographic protocol verification because of this effort. moreover, we believe that further development of this method may solve many problems that encountered by researchers in the field of protocol verification because of the use of formal methods.
منابع مشابه
Verification of Authentication Protocols using SDL-method
Authentication between protocol agents is widely studied in the cryptographic protocol analysis area. It is essential in a virtual environment to rely on protocol parties' identity. In the academic literature there are many protocols that provide the authentication property. We present in this paper a new mechanism to verify authentication using SDL, general purpose specification language. We h...
متن کاملExperiments on the Automatic Evolution of Protocols Using Genetic Programming
One of the biggest challenges in obtaining truly autonomic, selfmanaged networks is to automate the process of software evolution, and in particular, the evolution of protocol implementations and configurations. Such networks ultimately require self-modifying, evolving protocol software. Otherwise humans must intervene in every situation that has not been anticipated at design time. For this to...
متن کاملTowards Automatic Verification of Authentication Protocols on an Unbounded Network
Schneider’s work on rank functions [14] provides a formal approach to verification of certain properties of a security protocol. However, he illustrates the approach only with a protocol running on a small network; and no help is given with the somewhat hit-and-miss process of finding the rank function which underpins the central theorem. In this paper, we develop the theory to allow for an arb...
متن کاملAutomatic Programming of Robots Using Genetic Programming
The goal in automatic programming is to get a computer to perform a task by telling it what needs to be done, rather than by explicitly programming it. This paper considers the task of automatically generating a computer program to enable an autonomous mobile robot to perform the task of moving a box from the middle of an irregular shaped room to the wall. We compare the ability of the recently...
متن کاملDimensionality Reduction and Improving the Performance of Automatic Modulation Classification using Genetic Programming (RESEARCH NOTE)
This paper shows how we can make advantage of using genetic programming in selection of suitable features for automatic modulation recognition. Automatic modulation recognition is one of the essential components of modern receivers. In this regard, selection of suitable features may significantly affect the performance of the process. Simulations were conducted with 5db and 10db SNRs. Test and ...
متن کاملFormal Verification of IEEE 802.11 Authentication Protocols
IEEE 802.11 is the standard designed to provide secured communication in wireless LAN. The IEEE 802.11i specification contains both WPA-PSK, WPA-GPG authentication protocols. IEEE 802.11w authentication protocol enhances the IEEE802.11i security for selected management frames. These protocols allow a wireless station to gain access to a protected wireless network managed by an access point. In ...
متن کاملمنابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ذخیره در منابع من قبلا به منابع من ذحیره شده{@ msg_add @}
نوع سند: پایان نامه
وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان
کلمات کلیدی
میزبانی شده توسط پلتفرم ابری doprax.com
copyright © 2015-2023