Client and server authentication with trusted computing

Trusted Platform Module (TPM) is a security token embedded in every business laptop and computers. It can securely store artifacts used to authenticate the platform (PC or laptop). These artifacts can include passwords, certificates, or encryption keys. A TPM can also be used to store platform measu...

Full description

Saved in:
Bibliographic Details
Main Author: Tan, Derick Jia Xiong.
Other Authors: Yeo Chai Kiat
Format: Final Year Project
Language:English
Published: 2010
Subjects:
Online Access:http://hdl.handle.net/10356/38840
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-38840
record_format dspace
spelling sg-ntu-dr.10356-388402023-03-03T20:44:24Z Client and server authentication with trusted computing Tan, Derick Jia Xiong. Yeo Chai Kiat School of Computer Engineering Centre for Multimedia and Network Technology DRNTU::Engineering::Computer science and engineering::Computer systems organization::Computer-communication networks Trusted Platform Module (TPM) is a security token embedded in every business laptop and computers. It can securely store artifacts used to authenticate the platform (PC or laptop). These artifacts can include passwords, certificates, or encryption keys. A TPM can also be used to store platform measurements that help ensure that the platform remains trustworthy. Authentication (ensuring that the platform can prove that it is what it claims to be) and attestation (a process helping to prove that a platform is trustworthy and has not been breached) are necessary steps to ensure safer computing in all environments. The objective of the project is to develop a prototype system to demonstrate the authentication of a TPM-ready machine. The system consists of 2 machines – one as a challenger where it will challenge the identity of the verifying machine, and one as a verifier to verify its identity for which it claims to be. Both the TPM-ready client (verifier) and server (challenger) are installed with the Fedora 11 operating system with an Integrity Measurement Architecture (IMA) patched kernel to allow for measurement executable(s). Both also contain an application to encrypt and decrypt data. The system functions as follow to ensure the identity of the transmitter so that secure transmission of message can take place: - The client (verifier) requests to join the closed network. - The server (challenger) authenticates the client. If the client configuration is valid, it will be allowed to join the network. Otherwise, authorization to join the closed network is forbidden. Bachelor of Engineering (Computer Engineering) 2010-05-19T08:24:39Z 2010-05-19T08:24:39Z 2010 2010 Final Year Project (FYP) http://hdl.handle.net/10356/38840 en Nanyang Technological University 68 p. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic DRNTU::Engineering::Computer science and engineering::Computer systems organization::Computer-communication networks
spellingShingle DRNTU::Engineering::Computer science and engineering::Computer systems organization::Computer-communication networks
Tan, Derick Jia Xiong.
Client and server authentication with trusted computing
description Trusted Platform Module (TPM) is a security token embedded in every business laptop and computers. It can securely store artifacts used to authenticate the platform (PC or laptop). These artifacts can include passwords, certificates, or encryption keys. A TPM can also be used to store platform measurements that help ensure that the platform remains trustworthy. Authentication (ensuring that the platform can prove that it is what it claims to be) and attestation (a process helping to prove that a platform is trustworthy and has not been breached) are necessary steps to ensure safer computing in all environments. The objective of the project is to develop a prototype system to demonstrate the authentication of a TPM-ready machine. The system consists of 2 machines – one as a challenger where it will challenge the identity of the verifying machine, and one as a verifier to verify its identity for which it claims to be. Both the TPM-ready client (verifier) and server (challenger) are installed with the Fedora 11 operating system with an Integrity Measurement Architecture (IMA) patched kernel to allow for measurement executable(s). Both also contain an application to encrypt and decrypt data. The system functions as follow to ensure the identity of the transmitter so that secure transmission of message can take place: - The client (verifier) requests to join the closed network. - The server (challenger) authenticates the client. If the client configuration is valid, it will be allowed to join the network. Otherwise, authorization to join the closed network is forbidden.
author2 Yeo Chai Kiat
author_facet Yeo Chai Kiat
Tan, Derick Jia Xiong.
format Final Year Project
author Tan, Derick Jia Xiong.
author_sort Tan, Derick Jia Xiong.
title Client and server authentication with trusted computing
title_short Client and server authentication with trusted computing
title_full Client and server authentication with trusted computing
title_fullStr Client and server authentication with trusted computing
title_full_unstemmed Client and server authentication with trusted computing
title_sort client and server authentication with trusted computing
publishDate 2010
url http://hdl.handle.net/10356/38840
_version_ 1759858141438148608