Security Analysis of Personal Computers Based on Trusted Computing
This paper discussed the security of PCs based on trusted computing (TC). The existing TC systems were based on cryptographic techniques included authorization, encryption and authentication protocols and algorithms, and designed as one of PC components. It would authenticate any operation step by authorization protocols and authentication algorithms to guarantee the security of PCs. The PCs based on TC would include a special component, named TPM, compared with conventional PCs. The TPM mounted the motherboard of PC was a core hardware component to implement the functions of trusted computing. On the basis of description the structure of TPM according to TCG specification,the security of cryptographic protocols and algorithms used by the TPM was analyzed in detail.
Trusted computing Data security TPM Authorization protocols Cryptographic algorithm
LIU Niansheng LI Yongmei DING Yuechao GUO Donghui
School of Computer Engineering Jimei University Xiamen, Fujian Province, China School of Information Science and Technology Xiamen University Xiamen, Fujian Province, China
国际会议
厦门
英文
565-568
2006-07-27(万方平台首次上网日期,不代表论文的发表时间)