Abstract
Security of computer in network is becoming more and more challengeable. The traditional way of applying a common smart card to application can not meet the requirement of high degree of security in critical systems. Trust Computing Group (TCG) drafts out specifications on trust computing platform, which have been acknowledged by specialists in this field. Following these specifications, we designed and implemented a chip named SUP320 with SOC technology. This paper gives the chip’s hardware architecture, firmware modules and method for low power. Performance of SUP320 is tested in the end. We find that SUP320 is better than traditional smart cards in both security and efficiency.
Chapter PDF
Similar content being viewed by others
References
Trusted Computing Platform Alliance (TCPA), Main specification, February 2002. Version 1.1b.
Trusted Computing Platform Alliance (TCPA), PC Specific Implementation Specification version 1.0.
Trusted Computing Platform Alliance (TCPA), Trusted platform module protection profile, July 2002. Version 1.9.7.
Intel Low Pin Count (LPC) interface Specification Revision 1.1.
J.E. Dobson and B. Randell, Building Reliable Secure Computing Systems Out of Unreliable UnSecure Compinents, IEEE July 2003.
Ross Anderson, TCPApalladium frequently asked questions, http://www.cl.cam.ac.uk/users/rja14/tcpafaq.html accessed 13 March 2003.
W. A Arbaugh, D. J. Farber, and J. M Smith. A secure and reliable bootstrap architecture, In Proceedings 1997 IEEE Symposium on Security and Privacy, pages 65–71, May 1997.
Jean-Francois, Design of an Efficent Public-key Cryptographic Library for RISC-based smart cards. Ph.D. Thesis, University Catholique de Louvain, May 1998.
Koc, C.K, Acar, T., Burton S. kaliski Jr, Analyzing and Comparing Montgomery Multiplication Algorithms, IEEE Micro 16(3):26–33, June 1996.
Tung, C, “Signed-Digit Division Using Combinational Arithmetic,” IEEE Trans. On Comp., vol. C-19, no. 8, pp. 746–748, Aug, 1970.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 International Federation for Information Processing
About this paper
Cite this paper
Ren, J., Dai, K., Wang, Z., Zhao, X., Tong, Y. (2005). Design and Implementation of TPM SUP320. In: Sasaki, R., Qing, S., Okamoto, E., Yoshiura, H. (eds) Security and Privacy in the Age of Ubiquitous Computing. SEC 2005. IFIP Advances in Information and Communication Technology, vol 181. Springer, Boston, MA. https://doi.org/10.1007/0-387-25660-1_10
Download citation
DOI: https://doi.org/10.1007/0-387-25660-1_10
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-25658-0
Online ISBN: 978-0-387-25660-3
eBook Packages: Computer ScienceComputer Science (R0)