DocumentCode
649760
Title
An integrity-based mechanism for accessing keys in a mobile trusted module
Author
Daewon Kim ; Jeongnyeo Kim ; Hyunsook Cho
Author_Institution
Cyber Security Res. Dept., Electron. & Telecommun. Res. Inst., Daejeon, South Korea
fYear
2013
fDate
14-16 Oct. 2013
Firstpage
780
Lastpage
782
Abstract
The data encryption is a good method to hide the original contents of data from hackers. The main components of the cryptography are keys and passwords. In recent, to protect the keys from the hackers, the keys are stored into hardware modules that are independent on a user terminal. Otherwise, the passwords are easily exposed by a variety of password hacking techniques. Moreover, to access keys in the hardware module, users also have to input the password of key or hardware module every time. To solve these problems, we propose a mechanism to access keys in the hardware module without any password. The mechanism was implemented on our prototype with new MTM and management daemons in android environment.
Keywords
cryptography; mobility management (mobile radio); MTM; android environment; cryptography; data encryption; hardware module; integrity-based mechanism; key accessing; management daemon; mobile trusted module; password hacking technique; user terminal; Trusted platform module; authentication; hardware security module; integrity verification; mobile trusted module;
fLanguage
English
Publisher
ieee
Conference_Titel
ICT Convergence (ICTC), 2013 International Conference on
Conference_Location
Jeju
Type
conf
DOI
10.1109/ICTC.2013.6675477
Filename
6675477
Link To Document