Key Agreement Process

Commonly used key agreement protocols include diffie-hellman or protocols based on the RSA or ECC. The original and still most famous protocol for the key agreement was proposed by Diffie and Hellman (see the key agreement Diffie Hellman) as well as their concept of cryptography with public keys. Basically, Alice and Bob users send key public values through an uncertain channel. Based on the knowledge of the corresponding private keys, they are able to correctly and safely calculate a common key value. An earpiece, however, is not capable of this key with only the knowledge of… The data inside a computer is organized in bytes (8 bits) and is processed with Boolean logic, that is, the bits are processed using binary, add-on and multiplication operations. These binary operations are implemented with the logical operator XOR or in the language of the finished fields, GF (2). Since advanced ASCII defines 8 bits per byte, an 8-bit byte has a natural representation with a grade 8 polynome. Polynomaddition would be mod 2, and multiplication would be mod polynomiaal grade 8. Of course, this polynôme 8 should be irreducible. Therefore, the GF Galois field (28) would be the most natural tool to implement the encryption algorithm. In addition, this would give a narrow algebraic formulation.

For hardware insulation, [AZA 11] proposed a highly isolated computing environment (Strongly Isolated Computing Environment), a framework that provides an isolated hardware-level execution environment for x86 hardware platforms. It aims to provide a viable solution for sharing material resources with an isolated implementation environment. SICE does not rely on software components in the host environment (OS, Hypervisor), but the security of the isolated environment depends on the IT base (TCB) (includes only hardware, BIOS and system management mode (SMM)). According to the SICE design, it uses the hardware protection function of the standard X86 processor to create isolated running environments, z.B. using System Management RAM (SMRAM) for memory insulation. After being initiated by the BIOS, the SMRAM can be locked so that no software can access the content other than the SMM code.

Comments are closed.

Post Navigation