Font Size: a A A

Research And Embedded Implementation Of Distributed And Trusted Computing Authentication Server

Posted on:2017-03-18Degree:MasterType:Thesis
Country:ChinaCandidate:R H ZhuFull Text:PDF
GTID:2308330503985260Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the continuous development of internet technology and the high sharing of network resources,we need to ensure the security of commerce,personage,military and the government information on the internet so that those people who are authorized and reliable can be admitted to have access to the network.So,we need to evaluate the credibility of the user platform in order to ensure reliable network communication fundamentally.This text studies the trusted computing technology deeply,applying the trusted computing to embedded platform and using the third party trusted module to take the initiative to measure system data in order to achieve a trusted star structure and avoid the problem of trusted attenuation in a trusted chain structure,accordingly creating an embedded trusted computing platform.Though the distributed certificate system can ensure authentication on the identity of two communicators before communication,but can not guarantee platforms’ credibility, that is often fatal flaw.Besides,if we apply the embedded trusted computing platform to the distributed certificate system,which will greatly increase the security.In order to achieve the embedded trusted computing platform,we can design a circuit board on STM32 as the third party trusted module and choose the Raspberry Pi development board as a embedded platform that is need to be reformed.The two things form the untrusted computing platform.By means of designing the embedded trusted boot code and the encrypted authentication code on the application layer to measure the whole platform’s credibility.Trusted startup code uses SHA-1 algorithm to measure the integrity of critical data and the encrypted authentication code uses RSA algorithm to certificate the identity of the root of trust.The embedded computing platform can apply to the mobile Ad Hoc,the smart home and other network strutures.
Keywords/Search Tags:trusted computing, distributed, identity authentication, embedded, SHA-1, RSA
PDF Full Text Request
Related items