ETRI-Knowledge Sharing Plaform

KOREAN
논문 검색
Type SCI
Year ~ Keyword

Detail

Conference Paper An Integrity-Based Mechanism for Accessing Keys in A Mobile Trusted Module
Cited 1 time in scopus Share share facebook twitter linkedin kakaostory
Authors
Daewon Kim, Jeongnyeo Kim, Hyunsook Cho
Issue Date
2013-10
Citation
International Conference on Information and Communication Technology Convergence (ICTC) 2013, pp.780-782
Publisher
IEEE
Language
English
Type
Conference Paper
DOI
https://dx.doi.org/10.1109/ICTC.2013.6675477
Abstract
The data encryption is a good method to hide the original contents of data from hackers. The main components of the cryptography are keys and passwords. In recent, to protect the keys from the hackers, the keys are stored into hardware modules that are independent on a user terminal. Otherwise, the passwords are easily exposed by a variety of password hacking techniques. Moreover, to access keys in the hardware module, users also have to input the password of key or hardware module every time. To solve these problems, we propose a mechanism to access keys in the hardware module without any password. The mechanism was implemented on our prototype with new MTM and management daemons in android environment. © 2013 IEEE.
KSP Keywords
Hardware module, Mobile trusted module, data encryption