Font Size: a A A

Research And Design Of The Trusted Chain Transmission Mechanism In Trusted Computing

Posted on:2012-05-02Degree:MasterType:Thesis
Country:ChinaCandidate:P YuFull Text:PDF
GTID:2178330332487533Subject:Cryptography
Abstract/Summary:PDF Full Text Request
Trusted Computing is a new-research direction in the field of information security,andmechanism of trusted chain is the key technologies for Trusted Computing application Mechanismof trusted chain need to have roots of trust,and then a trusted chain is established,and trust will betransmited to system's each module,the overall trusted system is established Nowadays,in thetrusted chain measuring process,the trusted measurement produces measure loss,the security oftrusted transmission is not very full,the monitoring of U disk which uses in the network is not veryrigorous,the trusted chain transmission is Seriously affectedThe paper mainly research and design to Chain of Trust Transmission Mechanism in TrustedComputingFirstly,the analysis and the research to the existing trusted measure method of sokwareinstallment and promotion,shortcoming of big loss of the current existence's transmission and theefficiency low-must be corresponding improved by the introduction of the updata control module,the new-trusted chain measurement method in the software installment and updata is proposedSecondly,the Middle Attack in the TNC is analysised and studied Adopted for the transmissionof information through multiple paths in the TNC,the trust chain transfer protocol has the securitythreats of middle attack Diffie—Hellman key exchange protocol is improved when information istransferred through multiple paths in the TNC,the transmission of Trusted Chain Protocol isproposed to prevent the middle attack The credibility oftrusted chain is guaranteedFinally,the trusted chain monitoring model of intranet U disk is analysised and studied Throughthe design of trusted chain monitoring system and double authentication protocol,encryption of Udisk's content,the problem of the unavailability of the intranet U disk in the extranet and theinformation revelation is solved,and have been solved Thereby,the function of trusted chainmonitoring ofthe intranet U disk is realized...
Keywords/Search Tags:Trusted Computing, Trusted Chain, Trusted Network Connect, Trust Monitoring
PDF Full Text Request
Related items