Refereed articles: An automatic search for security flaws in key management schemes

作者: D. Longley , S. Rigby

DOI: 10.1016/0167-4048(92)90222-D

关键词: PKCS #11CryptographySecurity testingSIMPLE (military communications protocol)Expert systemPrologKey managementComputer securityComputer science

摘要: Key management schemes implemented in tamper-proof secure modules are an essential feature of cryptographic systems applied to networks. Such must have sufficient functionality meet the demands users, but at same time they not be capable successful manipulation aimed attack on system. This paper describes a PROLOG program which seeks security flaws models such schemes, and hence enhances assurance provided by designer The extensively searches for potential attacks simple rule-based model system; it is suggested that this extended operations other areas when or safety investigated.

参考文章(3)
Sigmund N. Porter, A password extension for improved human factors Computers & Security. ,vol. 1, pp. 54- 56 ,(1982) , 10.1016/0167-4048(82)90025-6
J.K. Millen, S.C. Clark, S.B. Freedman, The Interrogator: Protocol Secuity Analysis IEEE Transactions on Software Engineering. ,vol. 13, pp. 274- 288 ,(1987) , 10.1109/TSE.1987.233151
Dennis Longley, Expert systems applied to the analysis of key management schemes Computers & Security. ,vol. 6, pp. 54- 67 ,(1987) , 10.1016/0167-4048(87)90126-X