Font Size: a A A

Design And Implementation Of E-signature System Based On Trusted Cryptography Module

Posted on:2013-07-30Degree:MasterType:Thesis
Country:ChinaCandidate:W LiFull Text:PDF
GTID:2248330395456434Subject:Cryptography
Abstract/Summary:PDF Full Text Request
With the development of information technology, e-signature technology plays an important role in e-government and e-commerce. At present, the e-signature is usually implemented in ordinary terminal device, but there still exit many difficulties in the construction of trust environment on ordinary terminal, so the security of e-signature can’t get effective guarantee.As to this problem, a trusted e-signature system is proposed in the paper based on the study of researched Trusted Cryptography Module (TCM), it takes an embedded Trusted E-signature Terminal as the core and work with the Trusted E-signature management system. We designed the hardware of E-signature terminal and the software module of signature management system and the communication protocol of Trusted E-signature system and finally realize the main program of signature terminal and development the signature management system. Trusted E-signature Terminal as a lower computer, which based on TCM as a trusted root, completing the function interface of the signing and verifying signature by TCM and HS32U2security chip. As a upper computer, Trust E-signature management system offers all kinds of assistance services, cooperating with Trusted E-signature Terminal, forming a complete Trusted E-signature system, realize the safe and reliable process of electronic document signing and verifying signature.
Keywords/Search Tags:Trusted computing, Trusted Cryptography Module, E-signatureEmbedded system
PDF Full Text Request
Related items