Home // MOBILITY 2014, The Fourth International Conference on Mobile Services, Resources, and Users // View article
A Design of Mobile Trusted Module for Application Dedicated Cryptographic Keys
Authors:
Daewon Kim
Yongsung Jeon
Jeongnyeo Kim
Keywords: trusted platform module, mobile trusted module, hardware security module, integrity verification, cryptography
Abstract:
Normally, users encrypt data with cryptographic keys to protect original contents from various hackings. The use of cryptographic keys means that the protection of cryptographic keys is also an important problem as much as that of the encrypted data. A common way for protecting the keys is to authenticate user’s key access authorities through some key passwords. However, nowadays the passwords can be easily exposed to a variety of password hacking techniques. The facts that the encrypted data is stored in unsafe storage, such as hard disk drivers or secure digital memory cards and that the cryptographic keys are accessed with any passwords mean that the encrypted original contents are no longer safe from the hackings. It is because hackers can decrypt user’s encrypted data with the acquired passwords after they modify user’s original applications or create new malicious applications. To solve this issue, we have developed a new mobile trusted module chip and management middleware based on the architecture with a key access mechanism dedicated to an application. In this paper, we present the design and operation of mobile trusted module chip and middleware together with some experimental results.
Pages: 1 to 5
Copyright: Copyright (c) IARIA, 2014
Publication date: July 20, 2014
Published in: conference
ISSN: 2308-3468
ISBN: 978-1-61208-366-7
Location: Paris, France
Dates: from July 20, 2014 to July 24, 2014