Abstract

Most of existing TCSS have defined the functional interface of software in accordance with TCG specification. However, there is no clear definition of the security functional requirements and security targets that TCSS needs to meet in TCG specification. An implementation scheme for TCSS was proposed, and a TCSS prototype on the basis of Common Criteria (CC), combining with TCSS security function division and practical application demands was implemented. The experimental results show that the proposed software prototype can support the interface call of the TPM 2.0 and the SM4 cipher algorithm of China.

Highlights

  • At present, network security threats and risks are becoming increasingly prominent all over the world

  • This paper proposed an implementation scheme for TCSS, and a TCSS prototype on the basis of Common Criteria (CC), combining with TCSS security function division and practical application demands

  • TCG Service Provider (TSP) is primarily used as a trusted proxy for local and remote applications, TCG Core Service (TCS) is used to provide a collection of public services, while TCG Device Driver Library (TDDL) is responsible for interacting with TPM

Read more

Summary

A Design of Trusted Computing Supporting Software based on Security Function

Most of existing TCSS have defined the functional interface of software in accordance with TCG specification. There is no clear definition of the security functional requirements and security targets that TCSS needs to meet in TCG specification. An implementation scheme for TCSS was proposed, and a TCSS prototype on the basis of Common Criteria (CC), combining with TCSS security function division and practical application demands was implemented. The experimental results show that the proposed software prototype can support the interface call of the TPM 2.0 and the SM4 cipher algorithm of China

Introduction
Background
Common Criteria
Security function analysis of TCSS
Experiment
Conclusions
Common Criteria for Information Technology

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.