On trusted computer platform key management

被引:0
|
作者
Xu Yi [1 ]
Fan Huimin [2 ]
机构
[1] Northwest Univ Polit Sci & Law, Dept Informat Management & Informat Syst, Business Sch, Xian, Peoples R China
[2] Xian Technol Univ, Sch Comp Sci & Engn, Xian, Peoples R China
来源
AGRO FOOD INDUSTRY HI-TECH | 2017年 / 28卷 / 01期
关键词
Trusted computing; trusted computing platform; key; key management;
D O I
暂无
中图分类号
Q81 [生物工程学(生物技术)]; Q93 [微生物学];
学科分类号
071005 ; 0836 ; 090102 ; 100705 ;
摘要
With the shortcomings of pure software security protection, the embedded trusted security model (ETSM) trusted computing platform framework is proposed. This framework is based on trusted computing technology and the interface specification of the national trusted cryptography module (TCM). Based on the core content of the trusted computing key management method, this paper proposes a key management architecture based on ETSM, implementing functions such as the encryption algorithm (or cryptographic engine), the generation of key management function, and random key into the ETSM hardware environment. The basic management function of the ETSM key management architecture is designed and implemented; dual port key buffer management and the external key storage management scheme are provided. Independent of the ETSM module and the PC host, a heterogeneous dual processor system, PC via PCI interface and ETSM communication cam rapidly complete sensitive data encryption and decryption and save nonvolatile memory and related keys to ETSM. These functions ensure encryption security, improve the credibility of the heterogeneous system, and meet trusted computing platform integrity and safety requirements. This paper focuses on the key management mechanism of trusted computing and the key algorithm of trusted platform. First, trusted computing and trusted computing modules are introduced, followed by the importance of a trusted computing module. The key management mechanism in trusted computing and the original management mechanism are analyzed to propose a new mechanism. Finally, the two algorithms used in the study are studied, with one finding the inversed algorithm and the other the generation algorithm. After improvements, a more efficient algorithm is formulated via theoretical verification and data analysis. The algorithm runs faster, consumes less memory, and performs efficiently when solving problems on the existing platform, and it can also improve the operational efficiency in terms of overhead.
引用
收藏
页码:579 / 583
页数:5
相关论文
共 50 条
  • [22] Research on theory and key technology of trusted computing platform security testing and evaluation
    Zhang HuanGuo
    Yan Fei
    Fu JianMing
    Xu MingDi
    Yang Yang
    He Fan
    Zhan Jing
    SCIENCE CHINA-INFORMATION SCIENCES, 2010, 53 (03) : 434 - 453
  • [23] A Way of Key Management in Cloud Storage Based on Trusted Computing
    Yang, Xin
    Shen, Qingni
    Yang, Yahui
    Qing, Sihan
    NETWORK AND PARALLEL COMPUTING, 2011, 6985 : 135 - 145
  • [24] A practical and flexible key management mechanism for Trusted Collaborative Computing
    Zou, Xukai
    Dai, Yuan-Shun
    27TH IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (INFOCOM), VOLS 1-5, 2008, : 1211 - +
  • [25] Key Management for Wireless Sensor Networks Using Trusted Neighbors
    Yuan, Xue
    Juergensen, Helmut
    Azarderakhsh, Reza
    Reyhani-Masoleh, Arash
    EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 228 - +
  • [26] Encryption key management as a trusted security as a service for cloud computing
    Fehis, Saad
    Nouali, Omar
    Kechadi, Mohand-Tahar
    International Journal of Security and Networks, 2021, 16 (03) : 150 - 162
  • [27] A Trusted Security Key Management Server in LoRaWAN: Modelling and Analysis
    Ntshabele, Koketso
    Isong, Bassey
    Gasela, Naison
    Abu-Mahfouz, Adnan M.
    JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2022, 11 (03)
  • [28] A trusted open platform
    England, P
    Lampson, B
    Manferdelli, J
    Peinado, M
    Willman, B
    COMPUTER, 2003, 36 (07) : 55 - +
  • [29] The Trusted Platform Agent
    Cabiddu, Giovanni
    Cesena, Emanuele
    Sassu, Roberto
    Vernizzi, Davide
    Ramunno, Gianluca
    Lioy, Antonio
    IEEE SOFTWARE, 2011, 28 (02) : 35 - 41
  • [30] A Comprehensive Approach to Creating a Trusted Document Management Platform with a Digital Signature
    A. Yu. Shcherbakov
    Automatic Documentation and Mathematical Linguistics, 2020, 54 : 316 - 321