Design and Implementation of a Trusted SoC Chip

Article Preview

Abstract:

According to the relevant criterion and principle of trusted computed module design and application, we have designed a trusted SoC chip, and have given the implementation of the basic function. In detail, we have discussed the design of trusted SoC chip security architecture and the main module function, the reliability of relevant parameter and transfer strategy of trusted root in chip development and application, together with the simulation and validation of relevant function. At last, we point out that one of the most important further research directions is the trusted measurement of dynamic data and security environment.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

121-125

Citation:

Online since:

August 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] D. Feng, Support platform and interface criterion of trusted computing cryptography technology, Beijing, State password administration, 2007. (in Chinese).

Google Scholar

[2] GB/T 18336. 1, Information technology, security technology, security evaluation rule of information technology. First part: Brief introduction and common model, Beijing, Chinese standards Press, 2001. (in Chinese).

Google Scholar

[3] Trusted Computing Group, TPM Main Part 1: Design Principles, Version 1. 2, Revision 94, http: /www. trustedcomputinggroup. org/specs/TPM/Main Part1/Rev 94. zip, (2007).

Google Scholar

[4] Trusted Computing Group, TPM Main Part 2: TPM Structures, Version 1. 2, Revision 94, http: /www. trustedcomputinggroup. org /specs/TPM/Main Part2/Rev 94. zip, (2007).

Google Scholar

[5] L. Zhang, L. Zheng, R. Wang, and S. Wen, Desing and Implementation of Multiple Cryptographic Algorithm Interface Circuit Based on Secure SoC, in Proceedings of International Conference on Wireless communications, Networking and Information Security, Beijing China, 2010, p.510.

DOI: 10.1109/wcins.2010.5541831

Google Scholar

[6] Trusted Computing Group, Trusted Platform Modules Strengthen User and Platform Authenticity, https: /www. trustedcomputinggroup. org/specs/TPM/Whitepaper_TPMs_Strengthen_User_and_Platform_Authenticity_Final_1_0. pdf, (2005).

Google Scholar