Client and server authentication with trusted computing
Trusted Platform Module (TPM) is a security token embedded in every business laptop and computers. It can securely store artifacts used to authenticate the platform (PC or laptop). These artifacts can include passwords, certificates, or encryption keys. A TPM can also be used to store platform measu...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
2010
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/38840 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-38840 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-388402023-03-03T20:44:24Z Client and server authentication with trusted computing Tan, Derick Jia Xiong. Yeo Chai Kiat School of Computer Engineering Centre for Multimedia and Network Technology DRNTU::Engineering::Computer science and engineering::Computer systems organization::Computer-communication networks Trusted Platform Module (TPM) is a security token embedded in every business laptop and computers. It can securely store artifacts used to authenticate the platform (PC or laptop). These artifacts can include passwords, certificates, or encryption keys. A TPM can also be used to store platform measurements that help ensure that the platform remains trustworthy. Authentication (ensuring that the platform can prove that it is what it claims to be) and attestation (a process helping to prove that a platform is trustworthy and has not been breached) are necessary steps to ensure safer computing in all environments. The objective of the project is to develop a prototype system to demonstrate the authentication of a TPM-ready machine. The system consists of 2 machines – one as a challenger where it will challenge the identity of the verifying machine, and one as a verifier to verify its identity for which it claims to be. Both the TPM-ready client (verifier) and server (challenger) are installed with the Fedora 11 operating system with an Integrity Measurement Architecture (IMA) patched kernel to allow for measurement executable(s). Both also contain an application to encrypt and decrypt data. The system functions as follow to ensure the identity of the transmitter so that secure transmission of message can take place: - The client (verifier) requests to join the closed network. - The server (challenger) authenticates the client. If the client configuration is valid, it will be allowed to join the network. Otherwise, authorization to join the closed network is forbidden. Bachelor of Engineering (Computer Engineering) 2010-05-19T08:24:39Z 2010-05-19T08:24:39Z 2010 2010 Final Year Project (FYP) http://hdl.handle.net/10356/38840 en Nanyang Technological University 68 p. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
DRNTU::Engineering::Computer science and engineering::Computer systems organization::Computer-communication networks |
spellingShingle |
DRNTU::Engineering::Computer science and engineering::Computer systems organization::Computer-communication networks Tan, Derick Jia Xiong. Client and server authentication with trusted computing |
description |
Trusted Platform Module (TPM) is a security token embedded in every business laptop and computers. It can securely store artifacts used to authenticate the platform (PC or laptop). These artifacts can include passwords, certificates, or encryption keys. A TPM can also be used to store platform measurements that help ensure that the platform remains trustworthy. Authentication (ensuring that the platform can prove that it is what it claims to be) and attestation (a process helping to prove that a platform is trustworthy and has not been breached) are necessary steps to ensure safer computing in all environments. The objective of the project is to develop a prototype system to demonstrate the authentication of a TPM-ready machine.
The system consists of 2 machines – one as a challenger where it will challenge the identity of the verifying machine, and one as a verifier to verify its identity for which it claims to be. Both the TPM-ready client (verifier) and server (challenger) are installed with the Fedora 11 operating system with an Integrity Measurement Architecture (IMA) patched kernel to allow for measurement executable(s). Both also contain an application to encrypt and decrypt data.
The system functions as follow to ensure the identity of the transmitter so that secure transmission of message can take place:
- The client (verifier) requests to join the closed network.
- The server (challenger) authenticates the client. If the client configuration is valid, it will be allowed to join the network. Otherwise, authorization to join the closed network is forbidden. |
author2 |
Yeo Chai Kiat |
author_facet |
Yeo Chai Kiat Tan, Derick Jia Xiong. |
format |
Final Year Project |
author |
Tan, Derick Jia Xiong. |
author_sort |
Tan, Derick Jia Xiong. |
title |
Client and server authentication with trusted computing |
title_short |
Client and server authentication with trusted computing |
title_full |
Client and server authentication with trusted computing |
title_fullStr |
Client and server authentication with trusted computing |
title_full_unstemmed |
Client and server authentication with trusted computing |
title_sort |
client and server authentication with trusted computing |
publishDate |
2010 |
url |
http://hdl.handle.net/10356/38840 |
_version_ |
1759858141438148608 |