On trusted computer platform key management

被引:0
|
作者
Xu Yi [1 ]
Fan Huimin [2 ]
机构
[1] Northwest Univ Polit Sci & Law, Dept Informat Management & Informat Syst, Business Sch, Xian, Peoples R China
[2] Xian Technol Univ, Sch Comp Sci & Engn, Xian, Peoples R China
来源
AGRO FOOD INDUSTRY HI-TECH | 2017年 / 28卷 / 01期
关键词
Trusted computing; trusted computing platform; key; key management;
D O I
暂无
中图分类号
Q81 [生物工程学(生物技术)]; Q93 [微生物学];
学科分类号
071005 ; 0836 ; 090102 ; 100705 ;
摘要
With the shortcomings of pure software security protection, the embedded trusted security model (ETSM) trusted computing platform framework is proposed. This framework is based on trusted computing technology and the interface specification of the national trusted cryptography module (TCM). Based on the core content of the trusted computing key management method, this paper proposes a key management architecture based on ETSM, implementing functions such as the encryption algorithm (or cryptographic engine), the generation of key management function, and random key into the ETSM hardware environment. The basic management function of the ETSM key management architecture is designed and implemented; dual port key buffer management and the external key storage management scheme are provided. Independent of the ETSM module and the PC host, a heterogeneous dual processor system, PC via PCI interface and ETSM communication cam rapidly complete sensitive data encryption and decryption and save nonvolatile memory and related keys to ETSM. These functions ensure encryption security, improve the credibility of the heterogeneous system, and meet trusted computing platform integrity and safety requirements. This paper focuses on the key management mechanism of trusted computing and the key algorithm of trusted platform. First, trusted computing and trusted computing modules are introduced, followed by the importance of a trusted computing module. The key management mechanism in trusted computing and the original management mechanism are analyzed to propose a new mechanism. Finally, the two algorithms used in the study are studied, with one finding the inversed algorithm and the other the generation algorithm. After improvements, a more efficient algorithm is formulated via theoretical verification and data analysis. The algorithm runs faster, consumes less memory, and performs efficiently when solving problems on the existing platform, and it can also improve the operational efficiency in terms of overhead.
引用
收藏
页码:579 / 583
页数:5
相关论文
共 50 条
  • [41] Trusted Platform Module Evolution
    Osborn, Justin D.
    Challener, David C.
    JOHNS HOPKINS APL TECHNICAL DIGEST, 2013, 32 (02): : 536 - 543
  • [42] Trusted platform Module evolution
    Osborn, Justin D.
    Challener, David C.
    Johns Hopkins APL Technical Digest (Applied Physics Laboratory), 2013, 32 (02): : 536 - 543
  • [43] Trusted mobile devices: Requirements for a mobile Trusted Platform Module
    McGill, K.N. (kathleen.mcgill@jhuapl.edu), 2013, John Hopkins University (32):
  • [44] Firmware of trusted channel based on the trusted platform control module
    Mao Junjie
    Zhang Chongbin
    Zhang Baofeng
    Guo Ying
    Wu Yushu
    Xie Shihua
    Zhang Xiaofei
    Zhao Shuang
    2013 6TH INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKS AND INTELLIGENT SYSTEMS (ICINIS), 2013, : 189 - 192
  • [45] Trusted Mobile Devices: Requirements for a Mobile Trusted Platform Module
    McGill, Kathleen N.
    JOHNS HOPKINS APL TECHNICAL DIGEST, 2013, 32 (02): : 544 - 554
  • [46] A Key Management Scheme for Establishing an Encryption-based Trusted IoT System
    Mamun, Quazi
    Rana, Muhammad
    2019 4TH IEEE/ACM INTERNATIONAL CONFERENCE ON CONNECTED HEALTH: APPLICATIONS, SYSTEMS AND ENGINEERING TECHNOLOGIES (CHASE), 2019, : 41 - 46
  • [47] Multi-Tenant-Oriented Trusted Container Hierarchical Key Management Method
    Zhong, Qian
    Zhao, Bo
    An, Yang
    Li, Weidong
    Chen, Xifeng
    Shangguan, Chenhan
    Computer Engineering and Applications, 2024, 60 (12) : 283 - 293
  • [48] Trusted Group Key Management For Real-Time Critical Infrastructure Protection
    Jenkins, Jonathan
    Easton, Sean
    Guidry, David
    Burmester, Mike
    Liu, Xiuwen
    Yuan, Xin
    Lawrence, Joshua
    Ty, Sereyvathana
    2013 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2013), 2013, : 248 - 253
  • [49] KEY MANAGEMENT FOR DECENTRALIZED COMPUTER NETWORK SERVICES
    HARN, L
    LIN, HY
    IEEE TRANSACTIONS ON COMMUNICATIONS, 1993, 41 (12) : 1777 - 1779
  • [50] Bootstrapping Trust in a "Trusted" Virtualized Platform
    Lauer, Hagen
    Sakzad, Amin
    Rudolph, Carsten
    Nepal, Surya
    PROCEEDINGS OF THE 1ST ACM WORKSHOP ON WORKSHOP ON CYBER-SECURITY ARMS RACE (CYSARM '19), 2019, : 11 - 22