Font Size: a A A

The Research Of Trusted Software Stack Based On Domestic Platform

Posted on:2015-03-16Degree:MasterType:Thesis
Country:ChinaCandidate:R Y CuiFull Text:PDF
GTID:2298330452953256Subject:Computer technology
Abstract/Summary:PDF Full Text Request
In today’s information society, information security is facing serious challenges.In order to safeguard national security and interests, the localized study of informationsystem is of great strategic significance, of which the core processor, high-end generalchip is the most important in the process of localization. The series of Loongsonprocessors have possessed our country independent intellectual property rights, thebirth of the Loongson CPU has broken the status without the ‘core’ for a long time inour country.Hackers from decode passwords, steal session information, to use the defectconfiguration service and bug hole, then turned to attack without protection terminal.Therefore, Taking integrated measures from chips, boards and other hardware andBIOS, operating systems and the underlying software, can improve effectively thesecurity of the computer. Our country has developed independently a Trusted Modulebased on domestic password algorithm-Trusted Cryptography Module (TCM). TCMis set in the computer security subsystem, to provide security for the safety applicationsoftware. TSM provides the application with the entry point which call for TCM’ssecurity protection function, manages TCM resources, and hides the functionalcommand which TCM had build up. In fact, a secure application should not accessdirectly to the TCM, but use TCM safety features by calling the TCM Service Module(TSM).Combined with the trusted developed project based on domestic CPU platformfrom ZhongDian technology (Beijing) co, LTD. The paper have researched theimplementation of TCM system driver and TSM module, interface based on theLoongson3A processor, AMD RS780E+SB710chipset and TCM chip hardwareplatform, which provide the basis for application’s accessing the safe TCM hardwareresources in a reliable way.The main work is as follows:Firstly, introduces the main hardware platform at home and abroad, at the sametime, analyzes the importance of implementation of the trusted software stack basedon domestic platform.Secondly, discusses the trusted computing cryptographic support platform andits cryptographic algorithm.Thirdly, research the implementation of TCM driver and TSM layers including TDDL, TCS, TSP based on the Loongson3A processor architecture and TCM chip byexperimental, function analysis and other research methods.Finally, To assess the performance of TSM overall system, test the feasibility andvalidate the trusted computing technology of the TCM driver and the TSM.
Keywords/Search Tags:Loongson3A, Trusted Cryptography Module, TCM Service Module
PDF Full Text Request
Related items