DocumentCode :
649760
Title :
An integrity-based mechanism for accessing keys in a mobile trusted module
Author :
Daewon Kim ; Jeongnyeo Kim ; Hyunsook Cho
Author_Institution :
Cyber Security Res. Dept., Electron. & Telecommun. Res. Inst., Daejeon, South Korea
fYear :
2013
fDate :
14-16 Oct. 2013
Firstpage :
780
Lastpage :
782
Abstract :
The data encryption is a good method to hide the original contents of data from hackers. The main components of the cryptography are keys and passwords. In recent, to protect the keys from the hackers, the keys are stored into hardware modules that are independent on a user terminal. Otherwise, the passwords are easily exposed by a variety of password hacking techniques. Moreover, to access keys in the hardware module, users also have to input the password of key or hardware module every time. To solve these problems, we propose a mechanism to access keys in the hardware module without any password. The mechanism was implemented on our prototype with new MTM and management daemons in android environment.
Keywords :
cryptography; mobility management (mobile radio); MTM; android environment; cryptography; data encryption; hardware module; integrity-based mechanism; key accessing; management daemon; mobile trusted module; password hacking technique; user terminal; Trusted platform module; authentication; hardware security module; integrity verification; mobile trusted module;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
ICT Convergence (ICTC), 2013 International Conference on
Conference_Location :
Jeju
Type :
conf
DOI :
10.1109/ICTC.2013.6675477
Filename :
6675477
Link To Document :
بازگشت