Design and Application of a Secure Chip Key Issuing System

Article Preview

Abstract:

According to chip key’s security problem, this paper has designed a secure chip key issuing system and its application method. The chip key issuing system mainly include chip key issuing machine, key issuing host computer, key management server and cryptographic machine. Every key is protected to transmit and write into chip by conversational key which is agreed between chip key issuing machine and the cryptographic machine beside key management server when chip key is issuing. This chip key issuing system and method can provide effective guarantee to chip key’s security.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1305-1311

Citation:

Online since:

August 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Li Mei-feng, Dai Guan-zhong, Liu-Hang, Shi Feng, Design and FPGA Implementation of Key Acquisition Module in Encryption Chip, J. Computer Engineering And Applications, 2006, 09 132-134.

Google Scholar

[2] Zhang Feng, Ye Cheng-qing, A Trustable Network Security Model, J. Computer Applications and Software, 2005, 11 (22) 108-111.

Google Scholar

[3] Zhang Hong-qi, Wang Lu, Information Security Technology, Beijing, Higher Education Press, (2008).

Google Scholar

[4] Xu De-wu, Chen Wei, Digital Signature and Encrypt Algorithm Based on Elliptic Curve, J. Computer Engineering, 2011, 04 168-169.

Google Scholar

[5] Zhang Xiu-ai, Study of Elliptic Curve Cryptography, J. Communications Technology, 2009, 5 208-212.

Google Scholar

[6] Hong Li, Du Yao-zong, ECC-based key agreement and mutual authentication scheme, J. Computer Engineering And Design, 2007, 13(28) 168-169.

Google Scholar

[7] Kuang Hua-qing , Xie Dong-qing, Xia Feng, A Secure and Efficient Authenticated Key Agreement Protocol, J. Science Technology And Engineering, 2006, 5(6) 644-646.

Google Scholar

[8] Shao Xiao-bo, Reserach of Improved Key Agreement Scheme Based on Elliptic Curve Cryptography, J. Network & Computer Security, 2010, 2 23-25.

Google Scholar

[9] Public key cryptographic algorithm SM2 based on elliptic curves-Part 2: Digital Signature Algorithm (2012).

Google Scholar

[10] Public key cryptographic algorithm SM2 based on elliptic curves-Part 3: Key exchange protocol (2012).

Google Scholar

[11] Public key cryptographic algorithm SM2 based on elliptic curves-Part 4: Public key cryptographic algorithm (2012).

Google Scholar