Netinfo Security ›› 2020, Vol. 20 ›› Issue (8): 47-54.doi: 10.3969/j.issn.1671-1122.2020.08.006

Previous Articles     Next Articles

An Active Discovering and Secure Using Method of Hardware Cryptographic Resources Based on TrustZone

YUAN Lu1, HUANG Chenlin1(), LI Yun1, CHENG Hua2   

  1. 1. Academy of Computer Science, National University of Defense Technology, Changsha 410073, China
    2. State Key Laboratory of Mathematical Engineering and Advanced Computing, Wuxi 214083, China
  • Received:2020-06-01 Online:2020-08-10 Published:2020-10-20
  • Contact: HUANG Chenlin E-mail:huangchenlin76@gmail.com

Abstract:

In order to solve the problems that various cryptographic equipment providers are independent, the workload of security maintenance is large and the development of security applications is inconvenient, the researchers set up a cryptographic service framework at the operating system level to unify all kinds of hardware and software cryptographic resources. However, on the one hand, existing cryptographic service frameworks do not have the ability to actively discover and apply the hardware cryptographic resources, and users still need to manually load the cryptographic device and mount the cryptographic resources into the cryptographic service framework before they can be invoked and used in the security applications. On the other hand, high level security hardware cryptographic devices may be unauthorized accessed and used. In order to solve the above problems, this paper proposes a method of active discovery and secure use of hardware cryptographic resources based on TrustZone, which extends the cryptographic service framework through the secure isolation computing environment provided by TrustZone, and makes the cryptographic service framework have the ability to actively detect and securely load the system hardware cryptographic resources through the interaction with the operating system kernel. The prototype system is implemented on FT-2000/4 processer platform. The test results show that the proposed method can successfully realize the active discovery and secure use of hardware cryptographic resources.

Key words: cryptographic service framework, hardware cryptographic resource, active discovering, secure using

CLC Number: