Font Size: a A A

Design Of Trusted Computer Based On Cryptographic Technique And Domestic CPU

Posted on:2013-12-17Degree:MasterType:Thesis
Country:ChinaCandidate:J X GuoFull Text:PDF
GTID:2248330371987424Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of the computer and network technology, the information network is gradually important in modern society, and it has become an important work-life platform for more and more citizens. At the same time, the network enters into the public administration fields, such as government, military, economy, culture and education. A large number of important and sensitive information especially state secret are stored in the computer systems of these sectors. But now the information security issues are seriously, we are often facing the crisis, such as the system be hacked and the data be stolen, which may cause the great damage to the work and life of the public, so information security measures is imperative. The traditional information security measures can block the troublesome users and unlawful attack only in external, and can’t protect the information security from internal Therefore, the Trusted Computing technology which can protect the computer terminal’s security is becoming the hot topic of the research.In this paper, a design scheme of Trusted Computer based on cryptographic technique and domestic CPU is proposed, to solve the security problems of the data, files or other important information occurs in daily life in the state of lost, contingent event or seized by competitors.The scheme introduced a Trusted Computing concept base on cryptographic technique. In view of the insufficiency of the traditional software encryption method on encryption speed and performance, this paper proposes hardware-based encryption technology. In addition, relative to the import CPU takes the dominant position in the design of the large number of domestic computing terminal equipment, considering design the Godson3A as the main processor.Firstly, this paper studies the relative technology of Trusted Computing, and analyzes the Trusted Computing Platform which include the Trusted Platform Module and the TCG Software Stack. Based on this, the paper gives out the overall design schemes of Trusted Computer, and introduces the design goal, design plan, workflow, key management, integrity checking, user identification and authorization of the Trusted Computer. Compared with traditional Trusted Computer, the crypto-chip module of the Trusted Computer designed in this paper rely on a Trusted Computing Platform, which can quickly resolve the issue of information security, because it supports not only public-key cryptographic algorithms but also symmetric cryptographic algorithms.
Keywords/Search Tags:Trusted Computing, Trusted Computing Platform, TPM, Cryptographictechnique, domestic CPU
PDF Full Text Request
Related items