• DocumentCode
    649760
  • Title

    An integrity-based mechanism for accessing keys in a mobile trusted module

  • Author

    Daewon Kim ; Jeongnyeo Kim ; Hyunsook Cho

  • Author_Institution
    Cyber Security Res. Dept., Electron. & Telecommun. Res. Inst., Daejeon, South Korea
  • fYear
    2013
  • fDate
    14-16 Oct. 2013
  • Firstpage
    780
  • Lastpage
    782
  • Abstract
    The data encryption is a good method to hide the original contents of data from hackers. The main components of the cryptography are keys and passwords. In recent, to protect the keys from the hackers, the keys are stored into hardware modules that are independent on a user terminal. Otherwise, the passwords are easily exposed by a variety of password hacking techniques. Moreover, to access keys in the hardware module, users also have to input the password of key or hardware module every time. To solve these problems, we propose a mechanism to access keys in the hardware module without any password. The mechanism was implemented on our prototype with new MTM and management daemons in android environment.
  • Keywords
    cryptography; mobility management (mobile radio); MTM; android environment; cryptography; data encryption; hardware module; integrity-based mechanism; key accessing; management daemon; mobile trusted module; password hacking technique; user terminal; Trusted platform module; authentication; hardware security module; integrity verification; mobile trusted module;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    ICT Convergence (ICTC), 2013 International Conference on
  • Conference_Location
    Jeju
  • Type

    conf

  • DOI
    10.1109/ICTC.2013.6675477
  • Filename
    6675477