《山东大学学报(理学版)》 ›› 2020, Vol. 55 ›› Issue (3): 19-27.doi: 10.6040/j.issn.1671-9352.2.2019.205
摘要:
可信计算为系统安全问题提供了一种全新的解决途径。目前的国内外标准中所定义的可信密码功能访问方式一般为API接口方式,如TCG提出的可信软件栈(TSS)以及国家标准的TCM服务模块(TSM)等规定的接口,这些接口非常复杂,且存在相互间的兼容性问题,影响可信计算的开发和推广。为解决这些问题,本文中提出了一种基于消息驱动的分层可信密码服务框架,通过模块封装来屏蔽复杂的访问可信根的细节,简化接口,解决兼容性问题,并通过消息驱动的方式实现分布式、互相协作的可信根访问,以灵活支持不同应用所需要的可信服务。最后通过2个可信密码机制应用实例来说明本框架的可行性、框架中模块的通用性,以及框架在简化可信密码机制实现上的效果。
中图分类号:
1 | 张焕国, 韩文报, 来学嘉, 等. 网络空间安全综述[J]. 中国科学:信息科学, 2016, 46 (2): 125- 164. |
ZHANG Huanguo , HAN Wenbao , LAI Xuejia , et al. Overview of cyberspace security[J]. Scientia Sinica Informationis, 2016, 46 (2): 125- 164. | |
2 | Trusted Computing Group. TPM 2.0 library specification[EB/OL]. (2013-03-15)[2019-10-21] https://trustedcomputinggroup.org/resource/tpm-library-specification/. |
3 | Trusted Computing Group. TPM 2.0: a brief introduction[EB/OL]. (2019-06-07)[2019-12-05] https://trustedcomputinggroup.org/wp-content/uploads/2019_TCG_TPM2_BriefOverview_DR02web.pdf |
4 |
刘毅, 沈昌祥. 一种可信软件栈的兼容性改进方案[J]. 武汉大学学报(理学版), 2009, 55 (1): 57- 61.
doi: 10.3321/j.issn:1671-8836.2009.01.013 |
LIU Yi , SHEN Changxiang . Improvement about the compatibility of TCG software stack[J]. Journal of Wuhan University(Natural Science Edition), 2009, 55 (1): 57- 61.
doi: 10.3321/j.issn:1671-8836.2009.01.013 |
|
5 | ARTHUR W, CHALLENER D, GOLDMAN K. A practical guide to TPM 2.0[M]. Berkeley: Apress, 2015. |
6 | Trusted Computing Group. TSS system level API and TPM command transmission interface specification[EB/OL]. (2015-01-26)[2019-12-05] https://trustedcomputinggroup.org/wp-content/uploads/TSS_system_API.pdf |
7 | Trusted Computing Group. TCG TSS 2.0 marshaling/unmarshaling API specification[EB/OL]. (2018-01-04)[2019-12-06] https://trustedcomputinggroup.org/wp-content/uploads/TSS_Marshaling_Unmarshaling_API_Version-1.0_Revision-04_review_ENDS030918.pdf |
8 | 李晓丹.基于PCIe接口的可信计算应用平台的设计[D].太原:中北大学, 2019. |
LI Xiaodan. Design of trusted computing application platform based on PCIe interface[D]. Taiyuan: North University of China, 2019. | |
9 | 姚爽.基于SGX保护国密算法运行环境的研究与实现[D].北京:北京交通大学, 2018. |
YAO Shuang. Research and implementation of protecting the runtime environment for national cryptographic algorithm based on software guard extensions[D]. Beijing: Beijing Jiaotong University, 2018. | |
10 | 刘磊. 基于可信计算技术的密码服务平台[J]. 信息安全研究, 2017, 3 (4): 305- 309. |
LIU Lei . Cryptographic service platform based on trusted computing technology[J]. Journal of Information Security Research, 2017, 3 (4): 305- 309. | |
11 | STVBLE C , ZAERIN A . μTSS-a simplified trusted software stack[M]. Berlin: Springer, 2010: 124- 140. |
12 | SHI Wenchang. On design of a trusted software base with support of TPCM[C]// The First International Conference on Trusted Systems. Beijing: Springer, 2009: 1-15. |
13 | TAO Zheng, HU Jun, ZHAN Jing, et al. An application-oriented efficient encapsulation system for trusted software development[C]// 7th International Conference on Trusted Systems. Beijing: Springer, 2015: 153-168. |
14 | 胡俊, 沈昌祥, 公备. 可信计算3.0工程初步[M]. 北京: 人民邮电出版社, 2018: 13- 35. |
HU Jun , SHEN Changxiang , GONG Bei . Trusted computing 3.0 engineering fundamentals[M]. 2nd Ed Beijing: Posts and Telecommunications Press, 2018: 13- 35. |
[1] | 谢刚1,2,杨波1,3. 面向方面的模块化推理框架研究[J]. J4, 2011, 46(9): 48-52. |
|