Abstract:
A method of determining level of integrity within a plurality of virtual machine monitor (VMM) components in a virtual Trusted Platform Module (vTPM), the method includes the steps of measuring the plurality of VMM components (201), loading all related components to run (202), selecting a virtual core root of trusted measurement (vCRTM) (203), executing vCRTM measuring module (204, 205), measuring all other VMM components and extending measurements into platform configuration register (PCR) (210).
Abstract:
A SYSTEM (100) AND METHOD FOR VERIFYING AND EXECUTING REMOTE SOFTWARE APPLICATIONS (210) HAVING A SERVICE PROVIDER SERVER (200), A TRUSTED THIRD PARTY SERVER (300) HAVING A NETWORK (500) CONNECTION TO THE SERVICE PROVIDER SERVER (200), AND A CLIENT SYSTEM (400) HAVING A NETWORK (500) CONNECTION TO THE TRUSTED SERVER (300). THE SERVICE PROVIDER SERVER (200) STORES SOFTWARE APPLICATIONS (210), WHICH ARE DUPLICATED AND TRANSMITTED TO THE TRUSTED SERVER (300) UPON RECEIVING OF A USER ACCESS REQUEST FROM THE SAME. THE TRUSTED SERVER (300) HAVING MEANS (350) FOR VERIFYING THE SECURITY LEVEL OF THE SOFTWARE APPLICATION (210) AND MEANS (330) FOR EXECUTING THE SAME. THE CLIENT SYSTEM (400) HAVING MEANS FOR TRANSMITTING USER ACCESS REQUEST TO THE TRUSTED SERVER (300), MEANS (410) FOR TRANSMITTING INPUT DATA (440) TO THE TRUSTED SERVER (300), AND MEANS (410) FOR RECEIVING OUTPUT DATA FROM THE SAME.
Abstract:
One embodiment of the present invention is a method of linear transformation in Substitution-Permutation Network symmetric-key block cipher producing n x n key-dependent MDS matrices from given n x n MDS matrix by scalar multiplication and permutations of elements of given matrix where multiplicative scalar and permutations are derived from binary inputs of length l. The method comprising deriving multiplicative scalar from binary input; multiplying given matrix with multiplicative scalar, producing first intermediate matrix; deriving first permutation of n objects from binary input; permuting rows of first intermediate matrix according to first permutation, producing second intermediate matrix; deriving second permutation of n objects from binary input; and permuting columns of second intermediate matrix according to second permutation to produce final MDS matrix. Another embodiment of the present invention is a method of linear transformation in Substitution-Permutation Network symmetric-key block cipher producing n x n key-dependent MDS matrices from given n x n MDS matrix by scalar multiplication and permutations of elements of given matrix where multiplicative scalar and permutations are derived from binary inputs of length l. The method comprising deriving multiplicative scalar from the key (202); multiplying given matrix with multiplicative scalar to produce first intermediate matrix (204); deriving first permutation of n objects from the key (206); permuting rows of first intermediate matrix according to first permutation to produce second intermediate matrix (208); deriving second permutation of n objects from the key (304); and permuting columns of second intermediate matrix according to second permutation (212) to produce final MDS matrix (214).