"Palladium Cryptography": 1: Abstract
"Palladium Cryptography": 1: Abstract
1: ABSTRACT
As we tend towards a more and more
computer centric world, the concept of
data security has attained a paramount
importance. Though present day security
systems offer a good level of protection,
they are incapable of providing a trust
worthy environment and are vulnerable
to unexpected attacks. Palladium is a
content protection concept that has
spawned from the belief that the pc, as it
currently stands, is not architecturally
equipped to protect a user forms the
pitfalls and challenges that an allpervasive network such as the Internet
poses. As a drastic change in pc hardware
is not feasible largely due to economic
reasons, palladium hopes to introduce a
minimal change in this front. A paradigm
shift is awaited in this scenario with the
advent of usage of palladium, thus making
content protection a shared concern of
both software and hardware. In the course
of this paper the revolutionary aspects of
palladium are discussed in detail.
2: INTRODUCTION
Cryptography is the method in which a
message or file, called plain text, is taken
and encrypted into cipher text in such a
way that only authorized people know how
to convert it back to plain text. This is
done commonly in four ways:
Secret key cryptography, public key
cryptography,
one
way
function
cryptography and digital signatures.
Unless the encryption technique used is
very complex it is possible, with some
effort, for crackers to decrypt files.
Palladium is the code name for a
revolutionary set of features for the
windows operating system. The code
name of this initiative palladium, is a
moniker drawn from the Greek
mythological goddess of wisdom and
protector of civilized life. Till date most
3: NEED OF CRYPTOGRAPHY:
Need for security:
Many organizations posses valuable
information they guard closely. As more of
this information is stored in computers the
need of data security becomes increasingly
important. Protecting this information
against unauthorized usage is therefore a
major concern for both operating systems
and users alike.
Threats of data:
From a security perspective computer
systems have 3 general goals with
corresponding threats to them as listed
below:
5: ASPECTS OF PALLADIUM
Palladium comprises two key components:
hardware and software.
Hardware components
Engineered for ensuring the protected
execution of applications and processes,
the protected operating environment
provides the following basic mechanisms:
Trusted space (or curtained memory):
This is an execution space is protected
form external software attacks such as a
virus. Trusted space is set up and
maintained by the nexus and has access to
various services provided by palladium,
such as sealed storage. In other words it is
protected R.A.M.
Sealed storage: Sealed storage is an
authenticated mechanism that allows a
program to store secrets that cannot be
retrieved by non-trusted programs such as
a virus or Trojan horse. Information in
sealed storage cant be read by other nontrusted programs (sealed storage cannot be
read by unauthorized secure programs, for
that matter, and cannot be read even if
another operating system is booted or the
disk is carried to another machine.) these
stored secrets can be tied to the machine,
the nexus or the application. Palladium
will also provide mechanisms for the safe
and controlled backup and migration of
secrets to other machines. In other words it
is a secured and encrypted part of the hard
disk. Secure input and output: A secure
path from the keyboard and mouse to
palladium applications and a secure path
from palladium applications to the screen
ensure input-output security.
Attestation: Attestation is a mechanism
that allows the user to reveal selected
characteristics
of
the
operating
environment to external requestors. In
reality it takes the form of an encryption
co-processor. It is entrusted with the job of
encryption and decryption of data to and
from the sealed storage.
6: WORKING OF PALLADIUM
Palladium is a new hardware and software
architecture. This architecture will include
a new security computing chip and design
changes to a computers central processing
7:
PROTECTION
PALLADIUM
USING
9: CONCLUSION
Today, it managers face tremendous
challenges due to the inherent openness of
end-user machines, and millions of people
simply avoid some online transactions out
of fear. However, with the usage of
palladium systems, trustworthy, secure
interactions will become possible. This
technology will provide tougher security
defenses and more abundant privacy
benefits than ever before. With palladium,
users will have unparalleled power over
system integrity, personal privacy and data
10. REFERENCES: