NexTech 2021 Congress
October 03, 2021 to October 07, 2021 - Barcelona, Spain

  • UBICOMM 2021, The Fifteenth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies
  • ADVCOMP 2021, The Fifteenth International Conference on Advanced Engineering Computing and Applications in Sciences
  • SEMAPRO 2021, The Fifteenth International Conference on Advances in Semantic Processing
  • AMBIENT 2021, The Eleventh International Conference on Ambient Computing, Applications, Services and Technologies
  • EMERGING 2021, The Thirteenth International Conference on Emerging Networks and Systems Intelligence
  • DATA ANALYTICS 2021, The Tenth International Conference on Data Analytics
  • GLOBAL HEALTH 2021, The Tenth International Conference on Global Health Challenges
  • CYBER 2021, The Sixth International Conference on Cyber-Technologies and Cyber-Systems

SoftNet 2021 Congress
October 03, 2021 to October 07, 2021 - Barcelona, Spain

  • ICSEA 2021, The Sixteenth International Conference on Software Engineering Advances
  • ICSNC 2021, The Sixteenth International Conference on Systems and Networks Communications
  • CENTRIC 2021, The Fourteenth International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services
  • VALID 2021, The Thirteenth International Conference on Advances in System Testing and Validation Lifecycle
  • SIMUL 2021, The Thirteenth International Conference on Advances in System Simulation
  • SOTICS 2021, The Eleventh International Conference on Social Media Technologies, Communication, and Informatics
  • INNOV 2021, The Tenth International Conference on Communications, Computation, Networks and Technologies
  • HEALTHINFO 2021, The Sixth International Conference on Informatics and Assistive Technologies for Health-Care, Medical Support and Wellbeing

NetWare 2021 Congress
November 14, 2021 to November 18, 2021 - Athens, Greece

  • SENSORCOMM 2021, The Fifteenth International Conference on Sensor Technologies and Applications
  • SENSORDEVICES 2021, The Twelfth International Conference on Sensor Device Technologies and Applications
  • SECURWARE 2021, The Fifteenth International Conference on Emerging Security Information, Systems and Technologies
  • AFIN 2021, The Thirteenth International Conference on Advances in Future Internet
  • CENICS 2021, The Fourteenth International Conference on Advances in Circuits, Electronics and Micro-electronics
  • ICQNM 2021, The Fifteenth International Conference on Quantum, Nano/Bio, and Micro Technologies
  • FASSI 2021, The Seventh International Conference on Fundamentals and Advances in Software Systems Integration
  • GREEN 2021, The Sixth International Conference on Green Communications, Computing and Technologies

TrendNews 2021 Congress
November 14, 2021 to November 18, 2021 - Athens, Greece

  • CORETA 2021, Advances on Core Technologies and Applications
  • DIGITAL 2021, Advances on Societal Digital Transformation

 


ThinkMind // MOBILITY 2014, The Fourth International Conference on Mobile Services, Resources, and Users // View article mobility_2014_1_10_70006


A Design of Mobile Trusted Module for Application Dedicated Cryptographic Keys

Authors:
Daewon Kim
Yongsung Jeon
Jeongnyeo Kim

Keywords: trusted platform module, mobile trusted module, hardware security module, integrity verification, cryptography

Abstract:
Normally, users encrypt data with cryptographic keys to protect original contents from various hackings. The use of cryptographic keys means that the protection of cryptographic keys is also an important problem as much as that of the encrypted data. A common way for protecting the keys is to authenticate user’s key access authorities through some key passwords. However, nowadays the passwords can be easily exposed to a variety of password hacking techniques. The facts that the encrypted data is stored in unsafe storage, such as hard disk drivers or secure digital memory cards and that the cryptographic keys are accessed with any passwords mean that the encrypted original contents are no longer safe from the hackings. It is because hackers can decrypt user’s encrypted data with the acquired passwords after they modify user’s original applications or create new malicious applications. To solve this issue, we have developed a new mobile trusted module chip and management middleware based on the architecture with a key access mechanism dedicated to an application. In this paper, we present the design and operation of mobile trusted module chip and middleware together with some experimental results.

Pages: 1 to 5

Copyright: Copyright (c) IARIA, 2014

Publication date: July 20, 2014

Published in: conference

ISSN: 2308-3468

ISBN: 978-1-61208-366-7

Location: Paris, France

Dates: from July 20, 2014 to July 24, 2014

SERVICES CONTACT
2010 - 2017 © ThinkMind. All rights reserved.
Read Terms of Service and Privacy Policy.