Font Size: a A A

Design And Implementation Of Security System Based USBKey

Posted on:2015-05-04Degree:MasterType:Thesis
Country:ChinaCandidate:L ShaoFull Text:PDF
GTID:2308330473953487Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of computer technology and network, information security issues are becoming increasingly complex, system security issues are emerging, which restricts the information technology development process. From the information system servers, networks and terminal, people tend to ignore the terminal protection. To these pressing issues, security problems on the client system architecture should be solved, establish a trusted computing environment for the system.In this thesis, the application credible mechanism and safety features as the main object of study, on the basis of in-depth analysis the principle of today’s trusted security enhancement technology,a credible Start Programme based on USBKey(UKey) under Linux platform is given. After researching the principle of decryption and encryption software TrueCrypt, a trusted disk encryption system based on UKey is designed, improved the security of terminal platform.This article describes the necessity of credible computer security enhancements, as well as to study the traditional security enhancement technology,as well as the trusted operating system, analyzes trusted boot technology and the relationship between credible and security. On this basis, we propose a credible security enhancements architecture which based on the UKey. By UKey device to achieve functionality as TPM, use the UKey and BIOS as the root trust of computer system, propose the trust chain compatible with structure of this. For the current terminal can not be safely authenticate users legality, achieve boot authentication based on UKey, verificate the operating system loader, operating system kernel and Init credible process, to ensure the boot process integrity. For autonomy and offline confidentiality requirements, we propose a disk encryption technology based on UKey, to ensure that users implement custom privacy policies and data ciphertext storage, provides a credible support for the establishment of a secure terminal environment based on Linux platform.Finally, we Conducte functional and performance testing for trusted boot technology based on UKey, test results show that the trusted boot mechanism based on UKey have smaller system loss, can meet the design requirements, prove the mechanism’s effectiveness and availability. Disk encryption technology test results show that the disk encryption technology’s impact on system performance is within an acceptable range, well realized in disk encryption requirements while meeting the design requirements.
Keywords/Search Tags:Credibility, security enhancements, UKey, disk encryption
PDF Full Text Request
Related items