Font Size: a A A

Design And Implementation Of Trusted Computing Development Environment

Posted on:2008-07-28Degree:MasterType:Thesis
Country:ChinaCandidate:D S SuFull Text:PDF
GTID:2208360215450088Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of Information Technology, more and more computing resources are connected and shared on Internet. The more we depend on Internet,the more risks we will take on. And to defeat the various security issues, experts are always doing broad research on security, establishing a lot of standard around security and also producing many related products. All of these push the computing into a high level.In the meanwhile, information security systems are becoming more and more complex and chaos. We can't easily resolve the security issues with the traditional methods, such as firewall,intrusion detection system. It turns out that the security of terminal is more important because the terminal is the essence of the Internet. The security of terminal is a new direction. The concept of Trusted Computing formed by Trusted Computing Group is gaining more importance in the modern IT world, which also follows this new direction.Trusted Platform Module is the core in Trusted Computing. It can provide Root Trust of Measurement, Root Trust of Storage and Root Trust of Reporting to Trusted Platform. It also provides the remote attestation capability for remote entity. Trusted Platform Module is the root of trust in Trusted Platform. To utilize the powerful capability provided by Trusted Platform Module, we need to know the detail of it.So in this paper, we take more effort on analyzing and research on the Trusted Platform Module. At first,the concept of Trusted Computing, Trusted Platform is clarified, then analyse the core components of Trusted Platform Module, such as cryptographic algorithm, protected storage, key management and cryptographic protocols.At last, we build the environment for Trusted Computing development with the tpm-emulator and TrouSers. We extend the tpm-emulator to support transport session and port the TrouSers on to tpm-emulator. Base on the development environment, an application is developed to demonstate the capability of Trusted Computing.
Keywords/Search Tags:Trusted Computing, Trusted Platform Module, Information Security, Security Chip
PDF Full Text Request
Related items