Font Size: a A A

Research On Security Mechanism Of USB Key

Posted on:2008-09-16Degree:MasterType:Thesis
Country:ChinaCandidate:Y F OuFull Text:PDF
GTID:2178360218453119Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
USB Key is a kind of cryptographic device which is newly developing, high-intensity and easy-to-use. In all kinds of the current cryptographic devices, USB Key gradually becomes the first choice of terminal security equipment in the PKI.Security functions provided by USB Key is the focus of our attention. The security mechanism of USB Key is the key to achieve security functions. Therefore, the security mechanism study of USB Key has great theoretical value and practical significance.USB Key can generate key pairs with the internal algorithm and complete encryption calculation,decryption calculation and digital signature calculation with the internal chip in the USB key. This paper uses Elliptic Curve Cryptographs Cryptosystem as the public key cryptosystem.ECC guarantees the absolute security of information in the technology. Meanwhile, USB Key uses the specific security logic in the hardware in order to prevent confidential information to be read out. Therefore, the USB Key has quite high security.This paper is based on the research and development of USB Key which is protected by a patent of WallGreat Data Systems Co.,Ltd. This paper is the conclusion based on the theory and technology. This paper discusses the security mechanism of USB Key, including the security mechanism of hardware and software.The work that the author mainly completed is as follows:●Analyzing the architecture of security system and the constitute of hardware.Pointing to a series of physical attacks that the USB Key faced, the paper put forwards the practical solutions;●Studying the realization of software security mechanism.The realization of software security mechanism depending on Chip Operating System in the USB Key.Discussing the basic design idea of COS including transmission management, security management, command management and file management;●Studying the application and realization of ECC in software security mechanism of USB Key. The applications include data encryption, data decryption, digital signature and identity authentication.Discussing the realization of ECC in these applications of USB Key.
Keywords/Search Tags:PKI, USB Key, Security Mechanism, ECC
PDF Full Text Request
Related items