Font Size: a A A

Design Of Military Trusted Terminal Based On Trusted Platform Module Author's Name: Hongwei Yuan Speciality: Information Security Supervisor: Prof. Yugui Qu Finished Time: May 8, 2010

Posted on:2011-09-17Degree:MasterType:Thesis
Country:ChinaCandidate:H W YuanFull Text:PDF
GTID:2178360308955590Subject:Information security
Abstract/Summary:PDF Full Text Request
Information warfare is a form of war that two warring military use information as the main combat force in the land of sea, air, space and electricity and to inclused the multi-dimensional military integration war under the conditions of nuclear deterrence. Therefore, the information war has become an important resources, the protection of information security was a main feature of the modern forces and an important factor in the decision result of a war.The current computer system not can be fundamentally solves for the more and more security problems. It raised a new system independed of the hardware module TPM to establish the root trust, combined with the password authentication mechanism of the trust through step by step extended to the entire computer system. TPM through public key authentication function and show that the functional measure against malicious software damage, illegal invasion the platform to the user that the integrity of its own credibility. This article on the TCG trusted computing platform is described in detail, system analysis and summary of TPM-based trusted platform security and existing solutions. In this paper, the main work and contribution are as follows:1.One trusted platform that if want to apply network service, both of service provider and applier must be proof with legal status itself in the network information system. While the existing identity authentication protocols are usually based on a series of interactive behavior, and ask their provide own safety information, so there is a clear problem, that is in the process of the platform to provide relevant information for the attacker, the fact that provides convenience to local platform by various attacks. This paper presents a credible DAA environment and agreement with certificate instead of configuration information authentication, able to interact effectively prevent confidential information platform of exposure, Scheme based on elliptic curve of proof data encryption technology, reliable and avoid the signature of interaction with the trusted third party may, at the same time, reduce the secrets of calculation and improve the platform remote anonymous certification efficiency and increase the system security.2. Using the Trusted Computing technology to solve computer security issues,in recent years has been a hotspot in theoretical and practical research.The trusted measurement mechanism is a core system component of the trusted computing system.Many security solutions of trusted computing are based on the trusted measurement mechanism.In this paper six chapter we show an indepth theoretical analysis about the trusted measurement mechanism and studied the integrity measurelllent and reporting technologies,summed up the application mode of the trusted measurement mechanism.This paper proposes and implements based a COTS principle, used TPM as the core design a military high-performance trusted computing platform. It utilizes the TPM platform security mechanism, and uses the special design of the structural. For the high safety requirements military information terminals provides a new research method.
Keywords/Search Tags:Trusted Computing, Trusted Platform Module, Elliptic Curve Cryptography, Commercial-off-the-shelf, Platform Configuration Register
PDF Full Text Request
Related items