J4 ›› 2012, Vol. 47 ›› Issue (9): 1-6.
• Articles • Next Articles
LUO Jun1, JIANG Jing-qi2, MIN Zhi-sheng1, LI Cheng-qing2
Received:
Online:
Published:
Abstract:
In the trusted embedded system, the security of embedded equipments startup process is the foundation of the running state security. Therefore, one method of trusted embedded system secure startup was proposed. In view of the intrinsic hardware structure of embedded equipment not to change, cross validation was done after embedded equipment was powered. Then, the integrity of the program codes of startup process were checked by using SHA-1 module. The obtained results show that the designed SHA-1 module is correct, and it can be applied in trusted embedded system to realize integrity measurement. Combined with the process of cross validation after powered, the embedded system secure startup is realized. The method can keep the intrinsic hardware structure of embedded equipment, and it has universal applicability.
Key words: trusted embedded system; secure startup; SHA-1
LUO Jun1, JIANG Jing-qi2, MIN Zhi-sheng1, LI Cheng-qing2. The research of trusted embedded system secure startup based on SHA-1 module[J].J4, 2012, 47(9): 1-6.
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: http://lxbwk.njournal.sdu.edu.cn/EN/
http://lxbwk.njournal.sdu.edu.cn/EN/Y2012/V47/I9/1
Cited