Font Size: a A A

Design And Implement Of A File Encryption System Based On Trusted Platform Module

Posted on:2009-03-11Degree:MasterType:Thesis
Country:ChinaCandidate:J N LiuFull Text:PDF
GTID:2178360245470033Subject:Signal and Information Processing
Abstract/Summary:PDF Full Text Request
Nowadays computer hard disks and other mass storage media replace papers as the major method of information storages and the information security problems grow to be remarkable. The security problems of electronic documents occur in two circumstances, dynamic transmission and static storage. For the transmission security, we can encrypt data first and then transfer, use the digital signature technique to ensure the validity and integrality. For the storage security, we need encryption and authentication technique to realize the storage encryption and access control of electronic documents.The concept of trusted computing and it's specifications of different platforms provided as a more secure computing environment, and on PCs it is mainly focused on the execution of applications and data encryption. In this thesis, we utilize some of the concepts of trusted computing to extend the function of Windows file system, and we designed and realized a file encryption system which is capable to provide high security for personal PCs and business PCs.Firstly, the paper explains the subject's significance and confirms the problems to be settled. It analyzes cryptography and trusted computing technology, which are the basic technologies on Analyzing and illuminating the system's whole design, the paper designates the application mode and environment and explains the system's components. It puts forwards a new symmetric keys management scheme based on the trusted computing. It makes the system more efficient and more secure. The paper also explains the system's operation flow and functions. After them, it explains the realization of main parts, including the main interface and the course of encrypting and decrypting. At last, it tests the speed parameters of the system to prove the high speed.
Keywords/Search Tags:trusted computing, file system, encryption, trusted platform model
PDF Full Text Request
Related items