On trusted computer platform key management

被引:0
|
作者
Xu Yi [1 ]
Fan Huimin [2 ]
机构
[1] Northwest Univ Polit Sci & Law, Dept Informat Management & Informat Syst, Business Sch, Xian, Peoples R China
[2] Xian Technol Univ, Sch Comp Sci & Engn, Xian, Peoples R China
来源
AGRO FOOD INDUSTRY HI-TECH | 2017年 / 28卷 / 01期
关键词
Trusted computing; trusted computing platform; key; key management;
D O I
暂无
中图分类号
Q81 [生物工程学(生物技术)]; Q93 [微生物学];
学科分类号
071005 ; 0836 ; 090102 ; 100705 ;
摘要
With the shortcomings of pure software security protection, the embedded trusted security model (ETSM) trusted computing platform framework is proposed. This framework is based on trusted computing technology and the interface specification of the national trusted cryptography module (TCM). Based on the core content of the trusted computing key management method, this paper proposes a key management architecture based on ETSM, implementing functions such as the encryption algorithm (or cryptographic engine), the generation of key management function, and random key into the ETSM hardware environment. The basic management function of the ETSM key management architecture is designed and implemented; dual port key buffer management and the external key storage management scheme are provided. Independent of the ETSM module and the PC host, a heterogeneous dual processor system, PC via PCI interface and ETSM communication cam rapidly complete sensitive data encryption and decryption and save nonvolatile memory and related keys to ETSM. These functions ensure encryption security, improve the credibility of the heterogeneous system, and meet trusted computing platform integrity and safety requirements. This paper focuses on the key management mechanism of trusted computing and the key algorithm of trusted platform. First, trusted computing and trusted computing modules are introduced, followed by the importance of a trusted computing module. The key management mechanism in trusted computing and the original management mechanism are analyzed to propose a new mechanism. Finally, the two algorithms used in the study are studied, with one finding the inversed algorithm and the other the generation algorithm. After improvements, a more efficient algorithm is formulated via theoretical verification and data analysis. The algorithm runs faster, consumes less memory, and performs efficiently when solving problems on the existing platform, and it can also improve the operational efficiency in terms of overhead.
引用
收藏
页码:579 / 583
页数:5
相关论文
共 50 条
  • [1] Blockchain based secret key management for trusted platform module standard in reconfigurable platform
    Paul, Rourab
    Ghosh, Nimisha
    Panigrahi, Amrutanshu
    Chakrabarti, Amlan
    Mohapatra, Prasant
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (22):
  • [2] A management approach to key-used times based on trusted platform module in cloud storage
    Ren, Z. (zhengwei_ren@163.com), 1628, Science Press (50):
  • [3] A trusted key management scheme for digital rights management
    Jeong, Y
    Yoon, K
    Ryou, J
    ETRI JOURNAL, 2005, 27 (01) : 114 - 117
  • [4] Trusted cloud platform oriented to knowledge management
    Dai, J. (zhanglifendaijun2013@gmail.com), 1600, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (09):
  • [5] Key management in trusted disk based on TPCM
    Wang, Guan
    Wang, Bo
    Ruan, Fu-Sheng
    Liu, Zhi-Jun
    Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology, 2010, 36 (SUPPL. 2): : 35 - 39
  • [6] Trust of user using U-key on trusted platform
    Peng, Shuanghe
    Han, Zhen
    2006 8TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, VOLS 1-4, 2006, : 3023 - +
  • [7] Integrity Management in a Trusted Utilitarian Data Exchange Platform
    Agrawal, Sweety
    Jog, Chinmay
    Srinivasa, Srinath
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2014 CONFERENCES, 2014, 8841 : 623 - 638
  • [8] Study on the Architecture and Management Platform Model of Trusted Network
    Peng, Xi
    Wu, Zheng
    Yu, Yang
    Zhang, Xia
    2008 IEEE INTERNATIONAL SYMPOSIUM ON KNOWLEDGE ACQUISITION AND MODELING WORKSHOP PROCEEDINGS, VOLS 1 AND 2, 2008, : 514 - +
  • [9] Key management in a non-trusted distributed environment
    Dawson, E
    Clark, A
    Looi, M
    FUTURE GENERATION COMPUTER SYSTEMS, 2000, 16 (04) : 319 - 329
  • [10] Key management for access control in trusted cloud storages
    Song, W. (songwei@whu.edu.cn), 1613, Science Press (50):