J4 ›› 2012, Vol. 47 ›› Issue (9): 1-6.

• Articles •     Next Articles

The research of trusted embedded system secure startup based on SHA-1 module

LUO Jun1, JIANG Jing-qi2, MIN Zhi-sheng1, LI Cheng-qing2   

  1. 1. Key Laboratory of Optoelectronics Technology and System, Ministry of Education, Chongqing University,
    Chongqing 400030, China;  2. Southwest Computer Industrial Company, Chongqing 400060, China
  • Received:2012-07-09 Online:2012-09-20 Published:2012-09-24

Abstract:

In the trusted embedded system, the security of embedded equipments startup process is the foundation of the running state security. Therefore, one method of trusted embedded system secure startup was proposed. In view of the intrinsic hardware structure of embedded equipment not to change, cross validation was done after embedded equipment was powered. Then, the integrity of the program codes of startup process were checked by using SHA-1 module. The obtained results show that the designed SHA-1 module is correct, and it can be applied in trusted embedded system to realize integrity measurement. Combined with the process of cross validation after powered, the embedded system secure startup is realized. The method can keep the intrinsic hardware structure of embedded equipment, and it has universal applicability.

Key words:  trusted embedded system; secure startup; SHA-1

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!