Font Size: a A A

Based On Trusted Computing Platform Key Management Algorithm

Posted on:2011-05-16Degree:MasterType:Thesis
Country:ChinaCandidate:S LanFull Text:PDF
GTID:2178360302490139Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
In today's information age, people are increasingly inseparable from the personal computer and the Internet, through the network to share information between people and deepen relationships. However, the traditional security measures can no longer meet people facing terminal security issues, intrusion detection and firewall technologies such defects has become increasingly evident. On this premise Trusted Computing Group put forward the concept of trusted computing, trusted computing because it is safe from the terminal to Cut is a solution to the traditional security issues, a new direction. Because of the solution to the security of the terminal is to solve the existing computer security dilemma key. Now trusted computing has become a hot current security research in the field, more and more people are involved in the research boom.This article focuses on studies of key management mechanisms for trusted computing platform, as well as the credibility of key algorithms. First set of trusted computing and the concept of trusted computing module, for the importance of trusted computing module to do the research. Trusted Computing in which the key management mechanism is analyzed, the original management mechanism is relatively complex, proposed a new mechanism. Finally focus on the TPM used in the two algorithms, one is seeking element method simulation of the other key generation algorithm. The improved theoretical validation and data analysis, to find the original algorithm is more efficient than the new algorithm. The new algorithm runs faster, consuming less memory efficient, to solve the existing problems on the platform for improving the operational efficiency of TPM is effective.
Keywords/Search Tags:Trusted Computing, Trusted Platform Module, Management of keys, Algorithm
PDF Full Text Request
Related items