基于國產平臺的可信軟件棧研究
發(fā)布時間:2018-03-28 10:48
本文選題:龍芯3A 切入點:可信密碼模塊 出處:《北京工業(yè)大學》2014年碩士論文
【摘要】:在當今信息社會中,信息安全面臨著嚴重的挑戰(zhàn)。為了維護國家安全和利益,信息系統(tǒng)國產化的研究具有重大的戰(zhàn)略意義,其中核心處理器、高端通用芯片是國產化過程中的重中之重。龍芯系列處理器是我國具有自主知識產權的系列處理器,龍芯處理器的誕生打破了我國長久以來的無“芯”狀況。 黑客從之前的破譯口令、竊取會話信息,到利用錯誤配置服務、bug服務漏洞,又轉向攻擊無保護的終端。因此,從芯片、主板等硬件和BIOS、操作系統(tǒng)等底層軟件綜合采取措施,才能有效地提高計算機的安全性。我國自主研制了基于國內密碼算法的可信模塊——可信密碼模塊(Trusted Cryptography Module,TCM)。TCM是置于計算機中的安全子系統(tǒng),為安全應用軟件在硬件上提供安全保障。TSM為應用程序調用TCM安全保護功能提供入口點,管理TCM資源,并向應用程序隱蔽TCM所建立的功能命令。事實上,安全應用程序不應該直接訪問TCM,而是通過調用TCM服務模塊(TCM Service Module,,TSM)來使用TCM的安全功能。 結合中電科技(北京)有限公司的國產CPU平臺安全可信開發(fā)項目,開展了基于龍芯3A處理器、AMD RS780E+SB710芯片組和TCM芯片硬件平臺的TCM系統(tǒng)驅動與TSM的模塊、接口實現(xiàn)的研究,為應用程序可靠地訪問安全的TCM硬件資源提供了基礎。主要工作如下: 首先,在介紹國內外主要硬件平臺的基礎上,分析了基于國產平臺的可信軟件棧實現(xiàn)的重要意義, 接著,論述了可信計算密碼支撐平臺及其所支持的密碼算法。 然后,基于龍芯3A處理器架構和TCM芯片平臺,采用了實驗法、功能分析法等研究方法研究了TCM驅動及TSM各層(TDDL、TCS、TSP)的實現(xiàn)。 最后,為了評估基于龍芯3A與TCM芯片硬件平臺的TSM系統(tǒng)的整體性能,進行了TCM驅動和TSM的可行性的檢測以及可信計算技術的驗證。
[Abstract]:In today's information society, information security is facing serious challenges. In order to safeguard national security and interests, the study of localization of information system has great strategic significance, in which core processor, High-end universal chip is the most important in the process of localization. The Godson series processor is a series of processors with independent intellectual property rights in China. The birth of the Godson processor has broken the "core" situation of our country for a long time. Hackers used to break passwords, steal session information, exploit misconfigured services, bug service vulnerabilities, and then attack unprotected terminals. Therefore, from hardware such as chips, motherboards, and BIOSs, operating systems and other underlying software, comprehensive measures are taken. In order to improve the security of computer effectively, our country has developed a trusted Cryptography module, trusted Cryptography module, which is based on the domestic cipher algorithm. TCM is a security subsystem placed in the computer. Provides security for secure applications on hardware. TSM provides an entry point for applications to invoke TCM security protection, manages TCM resources, and hides functional commands created by TCM from the application. Security applications should not access TCMs directly, but use TCM's security capabilities by calling the TCM services module tcm Service module. Combined with the domestic CPU platform security and credible development project of China Electric Power Technology (Beijing) Co., Ltd, the research on the module and interface realization of TCM system driver and TSM based on RS780E SB710 chipset of Longson 3A processor and TCM chip hardware platform is carried out. Provides the basis for the application to reliably access secure TCM hardware resources. The main work is as follows:. Firstly, on the basis of introducing the main hardware platforms at home and abroad, the significance of the implementation of trusted software stack based on domestic platform is analyzed. Then, the trusted computing cryptographic support platform and its supported cryptographic algorithms are discussed. Then, based on the structure of Godson 3A processor and the TCM chip platform, the implementation of TCM driver and TSM TDDL TCSN TSPs is studied by means of experimental method and function analysis method. Finally, in order to evaluate the overall performance of TSM system based on Godson 3A and TCM chip hardware platform, the feasibility of TCM driver and TSM is tested and the trusted computing technology is verified.
【學位授予單位】:北京工業(yè)大學
【學位級別】:碩士
【學位授予年份】:2014
【分類號】:TP309
【參考文獻】
相關期刊論文 前2條
1 張煥國;嚴飛;傅建明;徐明迪;楊樝;何凡;詹靜;;可信計算平臺測評理論與關鍵技術研究[J];中國科學:信息科學;2010年02期
2 劉毅;沈昌祥;;一種可信軟件棧的兼容性改進方案[J];武漢大學學報(理學版);2009年01期
本文編號:1676005
本文鏈接:http://sikaile.net/falvlunwen/zhishichanquanfa/1676005.html