Font Size: a A A

Analysis And Implementation Of The Trusted Key Management Based On Java Smart Card

Posted on:2010-01-06Degree:MasterType:Thesis
Country:ChinaCandidate:Y F QiuFull Text:PDF
GTID:2178360272482451Subject:Cryptography
Abstract/Summary:PDF Full Text Request
At present it is difficult to establish the credibility in the general PC environment, but using Java smart card which has comparatively simple hardware and software systems, it is able to establish a credible environment, thereby constructs the trusted platform. On this trusted platform, reliable and secure key management is very important, which is the base of the secure storage for the data of the trusted platform.The paper implements the trusted key management applied to Java smart card which settles the foundation of secure storage for the data of the trusted Java smart card platform and provides security support for the secure communications between platforms.First, the paper studies the key management mechanisms of the existing Trusted Computing Platform; then, based on the research, the paper builds a Trusted Computing Platform using two open-source software packages of tpm_emulator and Trousers, thereby deeply analyses the process of key management mechanism of the Trusted Computing Platform along with the data structure and data flow involved in the process; finally, based on the research and analysis, the paper designs and implements the trusted key management based on the Java smart card.
Keywords/Search Tags:Trusted Computing, Key management, Java smart card
PDF Full Text Request
Related items