Next Generation Secure Computing Base (NGSCB).
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
vikram.kush2007@gmail.com
Active In SP
**

Posts: 1
Joined: Jan 2010
#1
20-01-2010, 04:55 PM


Hello,
Please mail me all the related data related with the topic "Next Generation Secure Computing Base (NGSCB)". I will be very much thank if it comprises of PPT and Seminar Report.

Kindly,send it before 24th of january,2010.
Thanking you,
Yours Sincerly,
Vishwavikram
Reply
justlikeheaven
Active In SP
**

Posts: 247
Joined: Jan 2010
#2
23-01-2010, 12:39 PM

Next Generation Secure Computing Base (NGSCB)
A broad definition can be given as:
The Next Generation Secure Computing Base (NGSCB) is a part of the Microsoft Vista operating system (OS) that employs a trusted platform module (TPM), a specialized chip that can be installed on the motherboard of a personal computer (PC) or server for the purpose of hardware authentication. NGSCB technology came under the code name Palladium, which was the word for a mythical talisman that guaranteed the security of Troy. NGSCB relies on hardware technology designed by members of the Trusted Computing Group (TCG), which provides a number of security-related features, including fast random number generation, a secure cryptographic co-processor, and the ability to hold cryptographic keys in a manner that should make them impossible to retrieve, even to the machine's owner.The development-phase version of NGSCB was originally called Palladium which was conceived jointly by Intel, AMD and Microsoft.

Architecture and technical details
It consists ofsoftware components developed by Microsoft and hardware components developed by the Trusted Computing Group.It requires specialized hardware and is not compatible with pc's before 2004.The two hardware components are: the Trusted Platform Module (TPM), which will provide secure storage of cryptographic keys and a secure cryptographic co-processor, and a curtained memory feature in the Central Processing Unit (CPU).

Secure storage and attestation

At the time of manufacture, a cryptographic key is generated and stored within the TPMand the TPM is designed in such a way that it is extremely difficult to retrieve the stored key by reverse engineering or any other method, even to the owner. Applications can pass data encrypted with this key to be decrypted by the TPM, but the TPM will only do so under certain strict conditions.The TPM is also able to produce a cryptographic signature based on its hidden key.

Curtained memory
Data within curtained memory can only be accessed by the application to which it belongs, and not by any other application or the Operating System.It is difficult to trick a trusted application into running outside of curtained memory and hence reverse engineering is also difficult.

Uses:
Digital Rights Management:
a secure form of Digital Rights Management (DRM) may be developed By utilizing the attestation, curtained memory and cryptographic features of the TPM. DRM would be implemented by encrypting DRM-protected files and only making the decryption key available to corporate trusted applications. Encrypted files are such that it would be extremely difficult to decrypt the file at an unauthorized destination, rendering it useless.

Owner Override:
Here, a secure method for the owner to identify themselves would be provided, and through this method the owner would be able to force the TPM to make a false attestation or decrypt data for an application that would not otherwise be allowed access to that data.

Network access:
NGSCB provides each workstation the ability to securely attest that no unauthorized modifications have been made either to its hardware or software.

ppt download:

.ppt   next generation secure computing base.ppt (Size: 4.28 MB / Downloads: 238)

for a seminar and presentation report pdf, visit:
sewpsc.sewp.nasa.gov/documents/ngscb.pdf
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
aman8000
Active In SP
**

Posts: 1
Joined: Apr 2010
#3
14-04-2010, 11:42 PM

thanx very very very much.....for your ppt and report.....really thank you
Reply
maheshdhoni
Active In SP
**

Posts: 2
Joined: Jan 2011
#4
30-01-2011, 06:11 AM

thanks dude...................
Reply
mahaboobkhan
Active In SP
**

Posts: 1
Joined: Feb 2011
#5
03-08-2011, 10:21 AM

could you send document of NGSCB
Reply
seminar paper
Active In SP
**

Posts: 6,455
Joined: Feb 2012
#6
14-02-2012, 11:59 AM


to get information about the topic NEXT GENERATION COMPUTING BASE full report ,ppt and related topic refer the link bellow

topicideashow-to-next-generation-secure-computing-base-ngscb

topicideashow-to-next-generation-secure-computing-base-ngscb--6101

topicideashow-to-next-generation-secure-computing-base-ngscb?page=2
Reply
ramya k s
Active In SP
**

Posts: 2
Joined: Mar 2012
#7
21-03-2012, 09:59 PM

Hi....
Can anyone tell what is the literature survey of next generation secure computing base.
Thank you.
Reply
seminar paper
Active In SP
**

Posts: 6,455
Joined: Feb 2012
#8
22-03-2012, 10:23 AM

To get more information about the topic " next generation secure computing base" please refer the link below


topicideashow-to-next-generation-secure-computing-base-ngscb
topicideashow-to-ngscb-trusted-computing-base-and-software-authentication
topicideashow-to-seminar and presentation-report-on-microsoft-palladium?pid=11289#pid11289
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  fifth generation fighter aircraft ppt Guest 2 79 31-10-2016, 12:47 PM
Last Post: anusree
  timetable generation project in php source code Guest 1 52 31-10-2016, 11:40 AM
Last Post: amrutha735
  mhd power generation seminar report pdf download Guest 1 98 31-10-2016, 10:51 AM
Last Post: jaseela123
  pdf for srs document for timetable generation Guest 1 72 31-10-2016, 10:44 AM
Last Post: jaseela123
  abstract large scale power generation using fuel cell ppt Guest 1 131 31-10-2016, 10:37 AM
Last Post: amrutha735
  mobile computing architecture ppt by rajkamal Guest 1 70 31-10-2016, 09:13 AM
Last Post: ijasti
  thermoelectric power generation full report Guest 1 61 29-10-2016, 03:23 PM
Last Post: jaseela123
  seminar report pervasive computing pdf Guest 1 60 29-10-2016, 03:07 PM
Last Post: Dhanabhagya
  fifth generation fighter aircraft ppt Guest 1 54 29-10-2016, 02:59 PM
Last Post: Dhanabhagya
  dfd of timetable generation system Guest 1 54 11-10-2016, 03:49 PM
Last Post: amrutha735