收录:
摘要:
Trusted computing has effectively solved the bottleneck problem of the traditional security technology, and it has become an important research area of the information security. Trusted cryptography module (TCM) is a must-have core module of cryptographic support platform for trusted computing, providing independent cryptographic algorithms. There are a great many of keys being managed in TCM, and TCM uses these keys to carry out its various functions. Platform Identification Key (PIK) plays an important role in the attestation to platform, platform integrity measurement and platform reporting process. In consequence, the security of PIK is directly related to the trusted platform security. By presenting the generation process of PIK in TCM, analyzing the advantages of the process, this paper posted corresponding solutions to the possible security risk in the process of PIK generation. It has effectively improved the safety of PIK generation process, greatly reduced the risk of exposure to private information.
关键词:
通讯作者信息:
电子邮件地址:
来源 :
ASIA-PACIFIC YOUTH CONFERENCE ON COMMUNICATION TECHNOLOGY 2010 (APYCCT 2010)
年份: 2010
页码: 91-94
语种: 英文
归属院系: