Skip to main content

KEYMEX: An expert system for the design of key management schemes

  • Section 3 Network Security
  • Conference paper
  • First Online:
Advances in Cryptology — AUSCRYPT '90 (AUSCRYPT 1990)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 453))

Included in the following conference series:

  • 237 Accesses

Abstract

This paper deals with the development of KEYMEX; an expert system for the design of key management schemes. The main task of KEYMEX is the detection of possible weaknesses in key management schemes. An outline of the structure of the system, which is based on semantical networks, is presented. The way in which the knowledge concerning the key management schemes to be tested is incorporated in the knowledge base of the expert system is discussed. Finally, the performance of the system is assessed on the basis of results which are obtained by application of the system to some well-known key management schemes and protocols.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Identity-based information security management for personal computer networks, E. Okamoto, K. Tanaka, IEEE Selected Areas in Communications, Vol. 7, no 2, February 1989, pp. 290–294

    Google Scholar 

  2. Expert Systems applied to the analysis of key management schemes, D. Longley, Computers and Security, 6, 1987, pp. 54–67

    Google Scholar 

  3. The Interrogator: protocol security analysis, J.K. Millen, S.C. Clark, S.B. Freedman, IEEE Software Eng., Vol. SE-13, no 2, February 1987, pp. 274–288

    Google Scholar 

  4. Automated analysis of cryptograms, B.R. Schatz, Cryptologia, April 1977, pp. 116–142

    Google Scholar 

  5. The automated analysis of substitution ciphers, J.M. Caroll, L. Robbins, Cryptologia, Vol. 10, no 4, October 1986, pp. 193–209

    Google Scholar 

  6. The automated cryptanalysis of polyalphabetic ciphers, J.M. Caroll, L. Robbins, Cryptologia, Vol. 11, no 4, October 1987, pp. 193–205

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Jennifer Seberry Josef Pieprzyk

Rights and permissions

Reprints and permissions

Copyright information

© 1990 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

van der Lubbe, J.C.A., Boekee, D.E. (1990). KEYMEX: An expert system for the design of key management schemes. In: Seberry, J., Pieprzyk, J. (eds) Advances in Cryptology — AUSCRYPT '90. AUSCRYPT 1990. Lecture Notes in Computer Science, vol 453. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0030354

Download citation

  • DOI: https://doi.org/10.1007/BFb0030354

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-53000-8

  • Online ISBN: 978-3-540-46297-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics