Enforced Conviction in Cryptographic Provenance Across Critical System Information

Asha N
unpublished
This project's aim is to describe two application, first one is keystroke integrity verification and secondly, malicious traffic detection or traffic monitoring. In this project we design and implement a cryptographic protocol that impose keystroke integrity by utilizing trusted computing platform and this approach helps to restrict outbound malware traffic. Trusted platform module is an international standard for secure crypto-processor. It offers facilities for the secure generation of
more » ... raphic key but in this paper for generating the public key and private key we are using a novel approach. We apply basic cryptographic mechanism to ensure the correct data flow. We describe how to integrate cryptographic components with operating system and how to use hardware tools for the integrity of cryptographic keys in our verification operations.
fatcat:igoxr6qgqzaxdoeh6zkndo452y