Table of Contents
PPT Slide
Who We Are
Security Research in IBM
Topics covered
Goal: A Secure System
Research Design Goal #1
Research Design Goal #2
Practical Goals and Constraints
Designing and Building a System
What We Built 4758 Cryptographic Coprocessor
4758 Coprocessor Hardware
4758 Coprocessor Software
Layer 2 Software Architecture
The Kernel
Communications, Host-to-Coprocessor
Secure Persistent Storage
Public Key Cryptography
DES
Random Number Generation
The Application Layer
Hindsight
Implementation Issues
Integration issues
API Extensions to-date
Summary of Services
|