Computer Science ›› 2010, Vol. 37 ›› Issue (6): 82-85.

Previous Articles     Next Articles

Research and Implementation of Key Generation Services Compatibility Based on TCM

JIANG Min-hui,HUANG Ning-yu,ZHU Lu   

  • Online:2018-12-01 Published:2018-12-01

Abstract: TPM (Trusted Platform Module) launched by TCG ( Trusted Computing Group) is the core module of trusted computing based on cryptographic technology. TPM provides asymmetric algorithm RSA to support key management scheme. Nowadays, China has raised Trusted Cryptography Module (TCM) , TCM provides asymmetric algorithm ECC and symmetric algorithm SMS4 to support key management scheme. The two chips can't be compatible, therefore the compatibility problem of key generation trusted application emerged. Through analyzing key management scheme in both TCM and TPM,as well as TCG software stack (TSS),provided the modification scheme on TSP (TCG Service Provider) and TCS(TCG Core Services) of TSS and the scheme based on key creation flow to solve the problem of key services application compatibility.

Key words: TPM, TCM,TSS, Key management, Compatibility

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!