Font Size: a A A

Design And Implementation Research Of Cryptographic Chip Operating System

Posted on:2012-12-19Degree:MasterType:Thesis
Country:ChinaCandidate:B ZhengFull Text:PDF
GTID:2218330371962630Subject:Cryptography
Abstract/Summary:PDF Full Text Request
Information security is the key issue to resolve in the process of information society. With the development of microelectronics technology, the System on Chip(SoC) had already owned high security and perfect function of cryptographic services. It played an irreplaceable role to ensure information security and build security service system.On the basis of research the used security service systems and considering the problems of it, the paper gives a new system model. Complying with ISO/IEC 7816-8 standard and the thought of cryptographic service objected, a new cryptographic chip operating system is designed.This paper has following contributions:1. After extensive research on the widely used cryptographic security system, especially the cryptographic middleware CryptoAPI and Cryptoki, the advanced ideas in them are analyzed, as well as the security problems and the shortages are pointed out. On this basis, a new cryptographic security system is given.2. The chip operating system on the SoC, which is the hardcore of the new cryptographic security system, is designed and implemented. Complying with ISO/IEC 7816-8 standard and object oriented, taking the method of structure programming, a prototype system to be tested is built, in which security environment is the kernel and manage security environment commands and perform security operation commands are realized.3. Block cipher algorithm interface layer, public-key cipher algorithm interface layer, hash function interface layer and message authentication interface layer are designed to enhance the flexibility and development of the system function service. And the standard processes to operate the algorithm interface and setting interface are given.4. To protect the cryptographic service system and improve the expansion of algorithms, the keys storage structure, algorithm setting and usage structure, file system access control mechanism and power-fail protection mechanism are realized.
Keywords/Search Tags:Chip Operating System, Security Related Interindustry Commands, Cryptography Services System, Algorithm Interface, Security Requirements For Cryptographic Modules
PDF Full Text Request
Related items