Font Size: a A A

Key Techniques Research And Implementation Of Secure Communication Protocol Based On Trusted Platform

Posted on:2006-10-05Degree:MasterType:Thesis
Country:ChinaCandidate:T B LiuFull Text:PDF
GTID:2178360185963751Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the rapid development of Internet, the Computer system and Computer network are facing to many serious security problems. Currently, security protocol is a hot research field in network security and has a very important effect for guarantee the network security. But, if the information has been displaced or modified by virus and Trojan horse before encryption in that the transmitted information is invalid although the protocol is secure.Trusted Computing Platform only performs the program that is assured by trusted root, and ensures the running program is legal. In the same time, Trusted Computing Platform can prevent the run of virus program and malicious code. This platform also solves the security problem of encrypt system and run environment.Taking the current security protocol to use in Trusted Computing Platform directly without modify, this process can ensure the communications security but do not take the advantage of Trusted Computing Platform. The perform efficiency is low, and this can't complete authentication of platform.For solving above problems, this paper presents a new security protocol based on Trusted Computing Platform. Simultaneously, we prove this protocol by formalized method and implement this protocol using NDIS Intermediate Drivers.Then, the security protocol is performed on security platform, we achieve a really high-performance and security communications. In our paper, we obtain the research result mainly as follows:1. We construct the model of security protocol based the Trusted Computing Platform.2. In the analysis of this new protocol, we take the network attack for validate, and also use the formalized method to prove protocol security theoretically.Performed on trusted computing platform, the protocol designed in this paper compares with the traditional security protocols, the computing speed is faster, the perform efficiency is higher, the information transfer is more safe.
Keywords/Search Tags:Trusted Computing Platform, Authentication, Security Protocol, Process Algebra, Formal verification
PDF Full Text Request
Related items