This paper proposes an evolutionary method that serves for designing security protocols. The principles of security protocols are outlined, followed by the outline of the evolutionary optimization framework and the techniques that can be used to automatically evolve basic security protocols.
|