The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

An Automatic Search for Security Flaws in Key Management Schemes

Author

D. Longley,S. Rigby

Entry type

article

Abstract

Key management schemes implemented in tamper-proof secure modules are an essential feature of cryptographic systems applied to networks. Such systems must have sufficient functionality to meet the demands of users but at the same time they must not be capable of successful manipulation aimed at an attack on the system. This paper describes a PROLOG program which seeks security flaws in models of such schemes, and hence enhances the assurance provided by the designer on the security of the system. The PROLOG program extensively searches for potential attacks in a simple rule-based modle of of the system; it is suggested that this program is capable of extended operations in other areas when security or safety flaws are to be investigated.

Date

1992

Institution

Elsevier Science Publishers Ltd.

Journal

Computers & Security

Key alpha

Longley

Number

1

Volume

11

Publication Date

0000-00-00

Keywords

Cryptography, key management, expert systems, search tree, DES

Location

A hard-copy of this is in the Papers Cabinet

BibTex-formatted data

To refer to this entry, you may select and copy the text below and paste it into your BibTex document. Note that the text may not contain all macros that BibTex supports.