会议专题

Security Analysis of Personal Computers Based on Trusted Computing

This paper discussed the security of PCs based on trusted computing (TC). The existing TC systems were based on cryptographic techniques included authorization, encryption and authentication protocols and algorithms, and designed as one of PC components. It would authenticate any operation step by authorization protocols and authentication algorithms to guarantee the security of PCs. The PCs based on TC would include a special component, named TPM, compared with conventional PCs. The TPM mounted the motherboard of PC was a core hardware component to implement the functions of trusted computing. On the basis of description the structure of TPM according to TCG specification,the security of cryptographic protocols and algorithms used by the TPM was analyzed in detail.

Trusted computing Data security TPM Authorization protocols Cryptographic algorithm

LIU Niansheng LI Yongmei DING Yuechao GUO Donghui

School of Computer Engineering Jimei University Xiamen, Fujian Province, China School of Information Science and Technology Xiamen University Xiamen, Fujian Province, China

国际会议

第一届国际计算机新科技与教育学术会议(Proceedings of the First International Conference on Computer Science & Education ICCSE2006)

厦门

英文

565-568

2006-07-27(万方平台首次上网日期,不代表论文的发表时间)