A practical key management scheme in software layer and its applications

An Wang*, Zheng Li, Xianwen Yang

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In practical application, the conventional key management schemes based on application layer software or tamper-proof hardware have a multiplicity of drawbacks. We propose an idea of managing keys in kernel mode and design a practical key management scheme based on function driver. After comprehensive analysis, our scheme can not only resist the threats of virus and reverse-engineering, but also overcome hardware's shortcomings of high cost and difficulty of upgrade. Moreover, the corruption attack which is troublesome in cryptography can also be resisted.

Original languageEnglish
Title of host publicationProceedings of the 2012 International Conference on Information Technology and Software Engineering - Software Engineering and Digital Media Technology
Pages285-293
Number of pages9
DOIs
Publication statusPublished - 2013
Externally publishedYes
Event2012 International Conference on Information Technology and Software Engineering, ITSE 2012 - Beijing, China
Duration: 8 Dec 201210 Dec 2012

Publication series

NameLecture Notes in Electrical Engineering
Volume212 LNEE
ISSN (Print)1876-1100
ISSN (Electronic)1876-1119

Conference

Conference2012 International Conference on Information Technology and Software Engineering, ITSE 2012
Country/TerritoryChina
CityBeijing
Period8/12/1210/12/12

Keywords

  • Corruption attack
  • Cryptography
  • Driver
  • Reverse-engineering

Fingerprint

Dive into the research topics of 'A practical key management scheme in software layer and its applications'. Together they form a unique fingerprint.

Cite this