An Automatic Search for Security Flaws in Key Management Schemes
Author
D. Longley,S. Rigby
Abstract
Key management schemes implemented in tamper-proof secure modules are an
essential feature of cryptographic systems applied to networks. Such systems
must have sufficient functionality to meet the demands of users but at the
same time they must not be capable of successful manipulation aimed at an
attack on the system. This paper describes a PROLOG program which seeks
security flaws in models of such schemes, and hence enhances the assurance
provided by the designer on the security of the system. The PROLOG program
extensively searches for potential attacks in a simple rule-based modle of
of the system; it is suggested that this program is capable of extended
operations in other areas when security or safety flaws are to be investigated.
Institution
Elsevier Science Publishers Ltd.
Journal
Computers & Security
Publication Date
0000-00-00
Keywords
Cryptography, key management, expert systems, search tree, DES
Location
A hard-copy of this is in the Papers Cabinet