"Putting Trust Into Computing: Where Does It Fit?"
Total Page:16
File Type:pdf, Size:1020Kb
"Putting Trust Into Computing: Where Does it Fit?" Monday, February 14, 2005 9:00 a.m. – 12:00 p.m. Copyright© 2005 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #1 Agenda 09:00am Introduction Jim Ward, IBM, TCG Board President / Chair 09:05am Trusted Network Connect Overview Thomas Hardjono, VeriSign 9:45am Open Source Solutions Dr. Dave Safford, IBM 10:25am Writing and Using Trusted Applications Ralph Engers, Utimaco Safeware AG; George Kastrinakis, Wave Systems; William Whyte, NTRU Cryptosystems, Inc. 11:15am Customer Case Studies Stacy Cannady, IBM; Manny Novoa, HP 11:50am Q&A Mark Schiller, HP; Jim Ward, IBM; Brian Berger, Wave Systems Copyright© 2005 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #2 Agenda 09:00am Introduction Jim Ward, IBM, TCG Board President / Chair Jim Ward is a Senior Technical Staff Member and security architect within the IBM software group division. Ward has been a core contributor in the security standards space and currently serves as the President and Board Chair of the Trusted Computing Group. Copyright© 2005 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #3 TCG Mission Develop and promote open, vendor-neutral, industry standard specifications for trusted computing building blocks and software interfaces across multiple platforms Copyright© 2005 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #4 TCG Board of Directors Copyright© 2005 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #5 TCG Organization Board of Directors Jim Ward, IBM, President and Chairman, Geoffrey Strongin, AMD, Mark Schiller, HP, David Riss, Intel, Steve Heil, Microsoft, Tom Tahan, Sun, Nicholas Szeto, Sony, Bob Thibadeau, Seagate, Thomas Hardjono, VeriSign Marketing Workgroup Technical Committee Advisory Council Administration Brian Berger, Wave Systems Graeme Proudler, HP Invited Participants VTM, Inc. Public TPM Work Group Conformance WG Relations David Grawrock, Intel Randy Mummert, Atmel Anne Price, PR Works TSS Work Group PC Client WG Position Key David Challener, IBM Monty Wiseman, Intel GREEN Box: Elected Officers Events BLUE Box: Chairs Appointed by Board RED Box: Chairs Nominated by WG, Marketing Infrastructure WG Mobile Phone WG Appointed by Board Support Janne Uusilehto, Nokia Thomas Hardjono, VeriSign Ned Smith, Intel BLACK Box: Resources Contracted by TCG VTM, Inc. Peripherals WG Storage Systems Colin Walters, Comodo Robert Thibadeau, Seagate Server Specific WG Larry McMahan, HP Hard Copy WG Marty Nicholes, HP Brian Volkoff, HP Copyright© 2005 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #6 Contributors Meetinghouse Data Communications TCG Membership Motorola Inc. 92 Total Members as of January 13, 2005 National Semiconductor nCipher 7 Promoter, 64 Contributor, 21 Adopter Network Associates Promoters Contributors Nokia AMD Agere Systems NTRU Cryptosystems, Inc. Hewlett-Packard ARM NVIDIA IBM ATI Technologies Inc. OSA Technologies, Inc Intel Corporation Atmel Philips Microsoft AuthenTec, Inc. Phoenix Sony Corporation AVAYA Pointsec Mobile Technologies Sun Microsystems, Inc. Broadcom Corporation Renesas Technology Corp. Certicom Corp. RSA Security, Inc. Adopters Comodo SafeNet, Inc. BigFix, Inc. Dell, Inc. Samsung Electronics Co. Citrix Systems, Inc Endforce, Inc. SCM Microsystems, Inc. Enterasys Networks Ericsson Mobile Platforms AB Seagate Technology Foundry Networks Inc. Extreme Networks SignaCert, Inc. Foundstone, Inc. France Telecom Group Sinosun Technology Co., Ltd. Gateway Freescale Semiconductor Standard Microsystems Corporation Industrial Technology Research Institute Fujitsu Limited STMicroelectronics Interdigital Communications Fujitsu Siemens Computers Sygate Technologies, Inc. Latis Networks, Inc. Funk Software, Inc. Symantec MCI Gemplus Symbian Ltd Nevis Networks, USA Giesecke & Devrient Synaptics Inc. PC Guardian Technologies Hitachi, Ltd. Texas Instruments Sana Security Infineon Transmeta Corporation Senforce Technologies, Inc InfoExpress, Inc. Trend Micro Silicon Integrated Systems Corp. iPass Utimaco Safeware AG Silicon Storage Technology, Inc. Juniper Networks VeriSign, Inc. Softex, Inc. Lenovo Holdings Limited Vernier Networks Telemidic Co. Ltd. Lexmark International VIA Technologies, Inc. Toshiba Corporation M-Systems Flash Disk Pioneers Vodafone Group Services LTD TriCipher, Inc. Wave Systems ULi Electronics Inc. Copyright© 2005 Trusted Computing Group - Other names and brands are properties of theirZone respective Labs, owners. Inc. Slide #7 Technical Work Groups • Technical Committee • Work Groups – Trusted Platform Module (TPM) – TPM Software Stack (TSS) – PC Specific Implementation – Peripheral Implementation – Server Specific Implementation – Storage Systems Implementation – Mobile Phone Specific Implementation – Conformance (Common Criteria) – Infrastructure – Hard Copy – Trusted Network Connect • Marketing Work Group Copyright© 2005 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #8 Agenda 09:05am Trusted Network Connect Overview Thomas Hardjono, VeriSign Thomas Hardjono is principal scientist and director within VeriSign. His work includes cryptography, network security, multicast/group security, PKI systems, wireless and 3G networks, digital rights management and trusted computing. He is currently co-chair of the Infrastructure Work Group within the Trusted Computing Group. He also represents VeriSign Inc. on the TCG Board of Directors.. Copyright© 2005 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #9 The TCG Trusted Network Connect (TNC) Architecture: An Overview Trusted Computing Seminar RSA 2005 Conference February 14, 2005 Copyright© 2005 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #10 Contents • The Challenge of Trusted Computing • Features & Benefits of Trusted Platforms • Trusted Network Connect (TNC) • Summary Copyright© 2005 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #11 Introduction The Challenge of Trusted Computing Copyright© 2005 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #12 The Challenge of Trusted Computing • Trusted Computing – How to create a safer computing environment that is faced with increasing frequency and sophistication of attacks – Protect end-user data – Enable trusted eCommerce transactions – Hardware-rooted trust • Increase the level of trust in the PC platform – Increase consumer confidence in Internet use – Reduce business risks, specially for security-conscious sectors • Financial Services, Insurance, Government, Healthcare – Increase in transaction volume and value with hardware enforced protections • Increase trust in other platforms – Laptops, Desktops, PDA, Servers, Mobile Phones, Network gear, etc. Copyright© 2005 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #13 Technical Challenge & the TP Solution • Challenge: – Allow communicating platforms to dynamically accept and execute code supplied by the network. – Allow a platform connect and interact with remote platforms. – Protection of data from misuse. • Solution: – Turn the entire platform into a trusted environment. – Enable a platform to prove that a given software environment is a protected environment. – Secrets are protected until the correct software environment exists • Only then are secrets released into that environment. Copyright© 2005 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #14 Features of Trusted Platforms What distinguishes TPs Copyright© 2005 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #15 Features of a Trusted Platform 1. Protected Capabilities • The set of commands with exclusive permission to access Shielded Locations (SL). • SL are places (memory, register, etc.) where it is safe to operate on sensitive data. • The TPM implements protected capabilities and shielded-locations. 2. Integrity Measurement and Storage • The Process of obtaining metrics of platform characteristics that affect the integrity (trustworthiness) of a platform. • The storing those metrics and the placement digests of those metrics in Platform Configuration Registers (PCR). Copyright© 2005 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #16 Features of a Trusted Platform (cont) 3. Integrity Reporting • The process of attesting to the contents of integrity storage (i.e. PCRs). • Philosophy: a platform may be permitted to enter any state possible (including insecure states), but it may not be permitted to lie about states that is was or was not in. • Multiple Roots of Trust in TPM (i.e. keys) 4. Attestations • The process of vouching for the accuracy of information (e.g. in the PCRs). • Attestations by the TPM and Platform • Attestation digitally signed using various TPM- bound and Platform-bound certificates. Copyright© 2005 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #17 Benefits of using TP Features • Integrity self-protection of a platform – Building blocks to turn the