Font Size: a A A

TPM-Based Chain Of Trust Transfer Model And Measurement Theory

Posted on:2012-12-06Degree:MasterType:Thesis
Country:ChinaCandidate:Z W GuoFull Text:PDF
GTID:2178330332495962Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
In the network information age, people use computer networks for information communication, processing and exchange has become an integral part of work life. At the same time, people are more and more concerned about the safety of network information. Due to viruses, Trojans, hackers and other network security threat to national security has occurred frequently, people gradually realized that the destruction of computer information systems for the attack, mostly from the terminal. Therefore, from the source to prevent such acts of destruction of information security must improve the security of computer terminals. In view of this, resulting in a trusted computing technology, the issue of the transitive trusted chain is the foundation for t rusted computing.Transfer around the issue of trust chain on the basis of previous work, this paper does the following work:(1)Terminal platform for ease of use TPM failure problem, we propose a compatible Trusted Platform Module trust under the boot stage of chain transfer model. Through the formal language of the program is validated, the results show that the model in theory is credible.(2)Based integrity measurement and reporting mechanisms, the paper analyze the chain of trust in the computing, storage, reporting, and a theoretical measure of the log analysis.(3)Transfer theory in the trust chain applications, TCG specification describes the binary Hash function based on remote attestation mechanism in privacy protection, system expansion, and open on the lack of flexibility. In view of this, the paper proposes an improved scheme - certificate-based trust negotiation hidden remote attestation mechanism. Elliptic encryption algorithm using the process of comparison tests on the agreement, the results show that: HC-RATN of strategic protection, certificate flexibility, model feasibility, protocol efficiency and other characteristics.
Keywords/Search Tags:Trusted Computing, TPM, Trusted Chain, Remote Attestation Mechanism
PDF Full Text Request
Related items