Font Size: a A A

Design And Implementation Of A File Encryption System Based On TPM

Posted on:2010-09-16Degree:MasterType:Thesis
Country:ChinaCandidate:Z H WuFull Text:PDF
GTID:2178360278466394Subject:Information security
Abstract/Summary:PDF Full Text Request
With the rapid development of digitalization, information, networking, electronic documents have become the major method of information storages, and the information security problems have been more and more remarkable. The security of electronic documents is becoming a hot issue in information security. The security problems of electronic documents contain two parts: storage security and transmission security. Encryption and authentication technique is an effective method to ensure storage security, which can be used to realize the storage encryption and access control of electronic documents. Asymmetric encryption and hash function is an effective method to ensure transmission security, which can be used to meet the demand of privacy, integrality and acknowledge.Trusted computing is a new technique for development of computer in modern world, and it provides the more valuable and trustable protection mechanism for the security of electronic documents. In this thesis, we utilize some of the concepts of trusted computing, and then especially based on the advantage of Trusted Platform Module's key storage and key management; we designed a file encryption system based on TPM which provides high security for electronic documents.Firstly, the paper explains the project's background and significance, and then confirms the problems to be settled. It analyzes encryption techniques, and put forth an effective encryption solution. It explains the concepts of trusted computing and Trusted Platform Module's architecture. In the main part, the paper describes each module's function, design philosophy and main interfaces in detail. At last, it analyzes the performance of the system, and tests the speed parameters of the system to prove the high speed.
Keywords/Search Tags:trusted computing, trusted platform module, file encryption system, key management
PDF Full Text Request
Related items