Font Size: a A A

Design And Implementation Of Trusted E-signature Terminal Based On Trusted Cryptography Module

Posted on:2011-08-07Degree:MasterType:Thesis
Country:ChinaCandidate:X D ShenFull Text:PDF
GTID:2178360302991294Subject:Cryptography
Abstract/Summary:PDF Full Text Request
The E-signature is usually implemented in PC at present, but the secure computing environment in PC is easily to be damaged by the malice code. Trusted computing PC can solve the security of the normal PC, but the PC over Trusted Computing research faces many obstacles in particular the trusted chain is hardly to pass through the operating system. In order to address the security issues of E-signature, this paper is designed and implemented a Trusted E-signature Terminal based on Trusted Cryptography Module (TCM). The first thing is design the hardware schematic, and then programmes the terminal device driver, TCM service module(TSM), the main program and other related software. The terminal code for each component is relatively simple, so it can use the root of trust for measurement to establish a trusted chain from the core root of trust for measurement to a trusted signature constructed a trusted computing environment. The terminal takes advantage of the root of trust for storage and the root of trust for reporting to realize the proof of the integrity of the platform, and ultimately achieves the trusted E-signature and verification.
Keywords/Search Tags:trusted computing, trusted cryptography module, embedded system, e-signature
PDF Full Text Request
Related items