Font Size: a A A

Based Authentication Of Trusted Computing Research

Posted on:2013-02-17Degree:MasterType:Thesis
Country:ChinaCandidate:L H WangFull Text:PDF
GTID:2218330371959954Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the Information Era's developing, the security issue of network resource becomes more and more important while it provides services to more and more customers. So Authentication as an important security tool has grown up,but there exists two serious problems.One is the private key's secure storage;The other one is the most Authentication systems have ignored the safety of the client terminal,if do not take it into account,can let trojan horse easily follow the user into the system and damage it. The paper will solve these two problems by trusted computing.The paper describes three types of authentication system,gives a detail of the technology about trusted computing platform authentication,trusted integrity and trusted storage,studys the theory about ID-based Identification to reduce the number of bilinear calculation,improves the algorithm of key extraction and ID revoked,then,present a new keys storage and management method,at the same time, introduces platform identity and integrity measurement techniques to slove the end-client platform's authentication.According to the theme, the paper designs the authentication system based on the TCM,and make a use in system of the "Large equipment management system of Chinese Academy".The paper gives the details about the system's function and implementation ways of the new system and runs it successfully. And proved the new authentication system is available and safe.
Keywords/Search Tags:Authentication, Data Encryption, Trusted Computing, Integrity Measurement
PDF Full Text Request
Related items