Home Page Icon
Home Page
Table of Contents for
Cover
Close
Cover
by Tsinghua University Tsinghua University Press, Dengguo Feng
Trusted Computing
Cover
Title Page
Copyright
Contents
1 Introduction
1.1 Related Work
1.1.1 Security Chip
1.1.2 Trust within a Terminal Platform
1.1.3 Trust between Platforms
1.1.4 Trust in Network
1.1.5 Test and Evaluation of Trusted Computing
1.2 Our Work
1.2.1 Chain of Trust
1.2.2 Remote Attestation
1.2.3 Trusted Network Connection
1.2.4 Application of Trusted Computing
1.2.5 Test and Evaluation of Trusted Computing
1.3 Problems and Challenges
1.4 Structure of This Book
2 Trusted Platform Module
2.1 Design Goals
2.2 TPM Security Chip
2.2.1 Introduction
2.2.2 Platform Data Protection
2.2.3 Identification
2.2.4 Integrity Storage and Reporting
2.2.5 Resource Protection
2.2.6 Auxiliary Functions
2.3 TCM Security Chip
2.3.1 Main Functionalities
2.3.2 Main Command Interfaces
2.4 Mobile Trusted Module
2.4.1 Main Features of MTM
2.4.2 MTM Functionalities and Commands
2.5 Developments of Related New Technologies
2.5.1 Dynamic Root of Trust for Measurement
2.5.2 Virtualization Technology
2.6 Summary
3 Building Chain of Trust
3.1 Root of Trust
3.1.1 Introduction of Root of Trust
3.1.2 Root of Trust for Measurement
3.1.3 Root of Trust for Storage and Reporting
3.2 Chain of Trust
3.2.1 The Proposal of Chain of Trust
3.2.2 Categories of Chain of Trust
3.2.3 Comparisons between Chains of Trust
3.3 Systems Based on Static Chain of Trust
3.3.1 Chain of Trust at Bootloader
3.3.2 Chain of Trust in OS
3.3.3 The ISCAS Chain of Trust
3.4 Systems Based on Dynamic Chain of Trust
3.4.1 Chain of Trust at Bootloader
3.4.2 Chain of Trust in OS
3.5 Chain of Trust for Virtualization Platforms
3.6 Summary
4 Trusted Software Stack
4.1 TSS Architecture and Functions
4.1.1 TSS Architecture
4.1.2 Trusted Device Driver
4.1.3 Trusted Device Driver Library
4.1.4 Trusted Core Services
4.1.5 Trusted Service Provider
4.2 TSS Interface
4.2.1 Object Type in TSM
4.2.2 TDDL Interface in TSM
4.2.3 TCS Interface in TSM
4.2.4 TSP Interface in TSM
4.3 Trusted Application Development
4.3.1 Calling Method of Interfaces
4.3.2 Example 1: File Encryption and Decryption
4.3.3 Example 2: Signature Verification in DRM
4.4 Open-Source TSS Implementation
4.4.1 TrouSerS
4.4.2 jTSS
4.4.3 μTSS
4.5 Summary
5 Trusted Computing Platform
5.1 Introduction
5.1.1 Development and Present Status
5.1.2 Basic Architecture
5.2 Personal Computer
5.2.1 Specification
5.2.2 Products and Applications
5.3 Server
5.3.1 Specification
5.3.2 Products and Applications
5.4 Trusted Mobile Platform
5.4.1 Specification
5.4.2 Generalized Architecture
5.4.3 Implementation of Trusted Mobile Platform
5.4.4 Applications
5.5 Virtualized Trusted Platform
5.5.1 Requirements and Specification
5.5.2 Generalized Architecture
5.5.3 Implementation of Virtualized Trusted Platform
5.5.4 Applications
5.6 Applications of Trusted Computing Platform
5.6.1 Data Protection
5.6.2 Security Authentication
5.6.3 System Security Enhancement
5.6.4 Trusted Cloud Services
5.6.5 Other Applications
5.7 Summary
6 Test and Evaluation of Trusted Computing
6.1 Compliance Test for TPM/TCM Specifications
6.1.1 Test Model
6.1.2 Test Method
6.1.3 Test Implementation
6.2 Analysis of Security Mechanism of Trusted Computing
6.2.1 Analysis Based on Model Checking
6.2.2 Analysis Based on Theorem Proving
6.3 Evaluation and Certification of Trusted Computing
6.3.1 Common Criteria
6.3.2 TPM and TNC Certification
6.4 Comprehensive Test and Analysis System of Trusted Computing Platform
6.4.1 Architecture and Functions of System
6.4.2 Compliance Test for TPM/TCM Specification
6.4.3 Tests of Cryptography Algorithms and Randoms
6.4.4 Simulation of Security Chip and Protocol
6.4.5 Promotion and Application
6.5 Summary
7 Remote Attestation
7.1 Remote Attestation Principle
7.1.1 Technology Foundation
7.1.2 Protocol Model
7.1.3 Interface Implementation
7.2 Comparison of Remote Attestation Researches
7.2.1 Attestation of Platform Identity
7.2.2 Attestation of Platform Integrity
7.3 Attestation of Platform Identity
7.3.1 Attestation of Platform Identity Based on Privacy CA
7.3.2 Direct Anonymous Attestation
7.3.3 Research Prospects
7.4 Attestation of Platform Integrity
7.4.1 Binary Remote Attestation
7.4.2 Property-Based Remote Attestation
7.4.3 Research Prospects
7.5 Remote Attestation System and Application
7.5.1 Remote Attestation System in Security PC
7.5.2 Integrity Verification Application on Mobile Platform
7.5.3 Remote Attestation Integrated with the TLS Protocol
7.6 Summary
8 Trust Network Connection
8.1 Background of TNC
8.1.1 Introduction to NAC
8.1.2 Commercial NAC Solutions
8.1.3 Defects of Current Solutions and TNC Motivation
8.2 Architecture and Principles of TNC
8.2.1 Standard Architecture
8.2.2 Overall Architecture
8.2.3 Workflow
8.2.4 The Advantages and Disadvantages of TNC
8.3 Research on Extension of TNC
8.3.1 Overview of the TNC Research
8.3.2 Trust@FHH
8.3.3 ISCAS Trusted Network Connection System
8.4 Application of Trusted Network Connection
8.5 Summary
Appendix A: Foundations of Cryptography
A.1 Block Cipher Algorithm
A.1.1 AES
A.1.2 SMS4
A.2 Public-Key Cryptography Algorithm
A.2.1 RSA
A.2.2 Elliptic Curve Public-Key Encryption Algorithm
A.2.3 SM2 Public-Key Encryption Algorithm
A.3 Digital Signature Algorithm
A.3.1 ECDSA Digital Signature Algorithm
A.3.2 SM2 Digital Signature
A.4 Hash Function
A.4.1 SHA-256 Hash Algorithm
A.4.2 SM3 Hash Algorithm
A.5 Key Exchange Protocols
A.5.1 MQV Key Exchange Protocol
A.5.2 SM2 Key Exchange Protocol
References
Index
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Next
Next Chapter
Halftitle Page
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset