Font Size: a A A

Research And Emulation Of Trusted Cryptography Module's Cryptography Scheme

Posted on:2009-05-10Degree:MasterType:Thesis
Country:ChinaCandidate:F F GuoFull Text:PDF
GTID:2178360242489552Subject:Information security
Abstract/Summary:PDF Full Text Request
21st century is an age of rapid growing information. Information has been a kind of important resource. Information security can reflect comprehensive national strength. Trusted computing is the latest field in today's information security research. It's the view of current computer system can not fundamentally resolve the security problem. Trusted computing establishes the confidence source by the integration of dedicate hardware module in the computing system. It makes resolving security problems of computing system fundamentally possible by using crypto mechanism to build a trusted chain and a trusted computing environment. TCG (Trusted Computing Group) took out the concept of trusted computing and established a series of criterion with the aim of enhancing the security of the computing environment in disparate computer platforms..This subject is from the 863 project named "The research of Trusted Crypto module's compatibility". In the research of TCG specification, we find some latent problems.This paper analyzes TCM (Trusted Cryptography Module) based on a new cryptography scheme. This paper concentrates on the cryptography scheme of TCM, compares it with the specifications of TCG. The author joins the design of solution scheme after detail analysis of potential problems in the design of TCG. The key problems include the management of authentication data, certificates and keys; and the security protocol, etc. TCM emulator is built to test the function and validate the feasibility and security of TCM's scheme.Compared with TCG's design, TCM reduces the storage space of keys and speeds up cryptography's work by adding symmetrical arithmetic and ECC arithmetic. TCM solves the synchronization problem of authentication data and lessens floors of keys by building entity table. The new cryptography scheme makes the management of certificates simpler and the migration of keys is more secure and simpler by using PEK (Platform Encryption Certificate). The efficiency and dependability of TCM has been validated by this paper's research and emulator testing.
Keywords/Search Tags:Trusted Computing, Cryptography Scheme, management of keys, Security protocol
PDF Full Text Request
Related items