Title :
How to use the TPM in the method of secure data exchange using Flash RAM media
Author :
Furtak, Janusz ; Palys, Tomasz ; Chudzikiewicz, Jan
Author_Institution :
Mil. Univ. of Technol., Warsaw, Poland
Abstract :
This document describes how to use the Trusted Platform Module (TPM) in the method of secure transmission of data stored on the Flash RAM through insecure transport channel. In this method the sender of the file specifies the recipient and the recipient knows who is the sender of the file. The idea of a solution that uses symmetric and asymmetric encryption is described. The TPM is used to safely generate symmetric and asymmetric keys, and theirs the safe collection, storage and management in order to protect files during transfer. The way of organizing data in a cryptographic keystore for users authorized to use the system for the secure transmission of files stored in Flash RAM is described.
Keywords :
cryptography; electronic data interchange; flash memories; random-access storage; trusted computing; TPM; asymmetric encryption; asymmetric keys; cryptographic keystore; data transmission security; flash RAM media; secure data exchange; symmetric encryption; symmetric keys; transport channel; trusted platform module; Encryption; Media; Protocols; Public key; Random access memory; Universal Serial Bus;
Conference_Titel :
Computer Science and Information Systems (FedCSIS), 2013 Federated Conference on
Conference_Location :
Krako??w