Waltzing the Bear, or: A Trusted Virtual Security Module

  • Ronald Toegl
  • Florian Reimair
  • Martin Pirker
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7868)

Abstract

Cryptographic key material needs to be protected. Currently, this is achieved by either pure software based solutions or by more expensive dedicated hardware security modules. We present a practical architecture to project the security provided by the Trusted Platform Module and Intel Trusted eXecution Technology on a virtual security module.

Our approach uses commodity personal computer hardware to offer integrity protection and strong isolation to a security module which implements a compact security API that has been fully verified. Performance results suggest that our approach offers an attractive balance between speed, security and cost.

Keywords

Trusted Computing Hardware Security Module Key Store API Verification 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Ronald Toegl
    • 1
  • Florian Reimair
    • 1
  • Martin Pirker
    • 1
  1. 1.Institute for Applied Information Processing and Communications (IAIK)Graz University of TechnologyGrazAustria

Personalised recommendations