Authentication is one of the most important properties in network security, it is usually ensured by designing authentication protocols which use cryptographic techniques. Unfortunately, practice proved that the analysis and design of a protocol is not easy even it is very simple. The paper describes an automatic generation of authentication security protocols based on the evolutionary algorithm and SVO logic and illustrates the approach can automatic generate large-scale authentication protocols, such as three-party key agreement etc.
展开▼