Abstract
This paper analyzes the cryptography scheme of the Trust Platform Model(TPM). The focus of the discussion would be the comparison of elliptic curve cryptography and the nowadays widely used 2048-bit RSA in evaluating which would be better suited to be used on TPM. A TPM implementation scheme based on ECC is proposed, which includes encryption and decryption schemes, signature and verification scheme, key agreement scheme. Corresponding examples of TPM commands would also be given.
Original language | English |
---|---|
Title of host publication | Proceedings of the Sixth International Conference on Machine Learning and Cybernetics, ICMLC 2007 |
Pages | 2168-2173 |
Number of pages | 6 |
DOIs | |
Publication status | Published - 2007 |
Externally published | Yes |
Event | 6th International Conference on Machine Learning and Cybernetics, ICMLC 2007 - Hong Kong, China Duration: 19 Aug 2007 → 22 Aug 2007 |
Publication series
Name | Proceedings of the Sixth International Conference on Machine Learning and Cybernetics, ICMLC 2007 |
---|---|
Volume | 4 |
Conference
Conference | 6th International Conference on Machine Learning and Cybernetics, ICMLC 2007 |
---|---|
Country/Territory | China |
City | Hong Kong |
Period | 19/08/07 → 22/08/07 |
Keywords
- Elliptic curve cryptosystem
- RSA
- TPM command
- TPM-emulator
- Trust platform model
Fingerprint
Dive into the research topics of 'Implementation of ECC-based trusted platform module'. Together they form a unique fingerprint.Cite this
Zhang, X., Zhou, M., Zhuang, J. X., & Li, J. (2007). Implementation of ECC-based trusted platform module. In Proceedings of the Sixth International Conference on Machine Learning and Cybernetics, ICMLC 2007 (pp. 2168-2173). Article 4370504 (Proceedings of the Sixth International Conference on Machine Learning and Cybernetics, ICMLC 2007; Vol. 4). https://doi.org/10.1109/ICMLC.2007.4370504