Working Document on Trusted Computing Platforms and in Particular on the Work Done by the Trusted Computing Group (TCG Group)

Working Document on Trusted Computing Platforms and in Particular on the Work Done by the Trusted Computing Group (TCG Group)

ARTICLE 29 Data Protection Working Party 11816/03/EN WP 86 Working Document on Trusted Computing Platforms and in particular on the work done by the Trusted Computing Group (TCG group) Adopted on 23 January 2004 This Working Party was set up under Article 29 of Directive 95/46/EC. It is an independent European advisory body on data protection and privacy. Its tasks are described in Article 30 of Directive 95/46/EC and Article 14 of Directive 97/66/EC. The secretariat is provided by Directorate E (Services, Copyright, Industrial Property and Data Protection) of the European Commission, Internal Market Directorate-General, B-1049 Brussels, Belgium, Office No C100-6/136. Website: www.europa.eu.int/comm/privacy Working Document on Trusted Computing Platforms and in particular on the work done by the Trusted Computing Group (TCG group) THE WORKING PARTY ON THE PROTECTION OF INDIVIDUALS WITH REGARD TO THE PROCESSING OF PERSONAL DATA set up by Directive 95/46/EC of the European Parliament and of the Council of 24 October 19951, having regard to Articles 29 and 30 paragraphs 1 (a) and 3 of that Directive, having regard to its Rules of Procedure and in particular to articles 12 and 14 thereof, has adopted the present Working Document: Background and future perspectives for trusted computing platforms The concept of trusted computing platforms originates from the computer industry’s observation that the current personal computer model is not conducive to guaranteeing security, as demonstrated by virus attacks, the possibility of spying on data being input, pirating of software and works of art, etc. This concept is increasing in importance at the same time as forecasts of Internet use predict a decline in the relative importance of the Web – the public part of the Internet characterised by a large number of unsecured transactions – with private areas where security concerns will be paramount taking up the slack. As the foundations of security are still to be laid down, electronic signatures and their legal development are attempts to deal with issues raised by transactions on the network, while trusted computing platforms are intended to deal with issues related to the ownership, integrity and, where necessary, confidentiality of intangible goods, and to controlling their use in terms of both software and hardware. Not all of the various building blocks of these new, highly sophisticated architectures have yet been defined, tested or are even available. However, it is clear that the level of security for such platforms will not be higher than EAL3, as defined by the common criteria. By way of comparison, the required level for bank cards which incorporate smart chips is EAL4 or EAL4+. Past attempts to increase security by identifying hardware components (such as Intel’s Pentium III, which included a unique universal identifier) faced setbacks because of the risks to privacy. Having learned their lesson, researchers turned to reconciling various 1 Official Journal no. L 281 of 23/11/1995, p. 31, available at: http://europa.eu.int/comm/internal_market/privacy/law_en.htm 2/9 ways of using sophisticated cryptology techniques, taking an approach which focused on protecting privacy and personal data. For this reason, PET (privacy enhancing technologies) applications such as individual digital safes or virtual identity managers are proposed for trusted computing platforms. However, up to now, no viable economic model can be provided for these functions, which would be based on dedicated chips. As a result, the applications are still relatively undeveloped, and the main focus is on digital rights management applications. However, it should be pointed out that the concept of property in the information society is in flux and the subject of heated and premature controversy. It is a long way from achieving either legal or economic stability. Moreover, the role that public areas are to play will probably have to be (re)considered. In addition, the concept of property is clearly part of the specifications for the Trusted Computing Platform Alliance (TCPA) and the Trusted Computing Group (TCG group) where the roles of users and administrators are clearly differentiated. It is administrators who are responsible for defining and limiting both the technical and practical rights of the users, which clearly raises questions of balance. Looking at future possibilities, Digital Rights Management (DRM) systems may be up to the task of defining and, to a point, making access, or even the use of personal data under contract, secure on an individual basis. If such applications are not yet mature, it is because they only exist in a few research laboratories and require the support of established law. Computing platforms capable of administering these rights will be the same as the trusted computing platforms which are the subject of this report. The Working Party’s approach and methodology The Working Party follows with interest the developments concerning Trusted Computing and, in particular, the work done by the Trusted Computing Group, an ad hoc industry consortium drafting specifications for a new class of hardware security chips called Trusted Platform Modules (TPM). While being aware of the fact that the TCG group focuses mainly on the definition of certain components of a platform rather than on the platform as a whole, the Working Party realises that the building blocks developed by the TCG group (and particularly the TPM) will have important consequences for the future functioning of platforms (currently PCs and servers, but also, in the long term, PDAs, mobile phones, etc) operating in a fully interconnected world. The international press also has given much attention to this development, as a result of not only the promotional activities of the TCG group but also of the important contributions to the discussion by some Data Protection Authorities2 and relevant academics3. The Working Party decided to enter into dialogue with the TCG group and, during 2003, held several meetings of its Internet Task Force with TCG group representatives to discuss the technical and legal aspects of the TCG group specifications. 2 Reference to documents of CNIL, Office of Alexander Dix… 3 Reference to work of Ross Anderson. 3/9 The Working Party is pleased to observe that the TCG group has taken on board several of its suggestions in version 1.2 of the specifications and has created a best practices group to make recommendations on data protection-related issues. It is the intention of this document to point out some of the matters that deserve additional attention and should be further considered by the TCG group. The evaluation of the TCG group work made in this document is limited by a number of constraints linked to the current level of development of the specifications. At the moment it is still impossible to know how the specifications will be used, which applications or operating systems will be developed, which actors will be involved, which business models will be put into place and so forth. Another element of uncertainty derives from the fact that the specifications neither oblige to use all its elements nor oblige to implement the new features included in version 1.2. Not all functions defined in the version 1.2 TPM specifications will be implemented in every platform-specific component. Therefore, this issue will require further work in the future; the Working Party will follow the developments, especially concerning specific applications. What is the TCPA/TCG group? According to own statements of this group, the mission of TCG group is to develop and promote open, vendor-neutral, industry standard specifications for trusted computing building blocks and software interfaces across multiple platforms. TCG group is incorporated as a not-for-profit corporation with international membership that has adopted the TCPA specifications as a starting point. The group, an ad hoc industry consortium, includes many important players in the technology field not only from the computer world but also from other disciplines. It is for instance interesting to note that Sony has joined this group4. Trusted Platform Modules (TPM) based on TCPA specification 1.1b are presently available from three vendors: Atmel, Infineon and National Semiconductor. Some compliant PC platforms are shipping now: IBM ThinkPad notebooks and NetVista desktops. The industry hopes more will be available soon. TCG group drafted specifications for security chips (TPM). These chips are targeted at the everyday computing, and so, according to the industry, the focus of efforts is on securing hardware platforms. The main objectives of the TCG group are authentication and increasing security levels. Furthermore TCG group products will help to realise Computational grids5. The TPM chip has the following functionalities: 4 The Trusted Computing Platform Alliance, or TCPA, was originally formed by Compaq, HP, IBM, Intel and Microsoft. Presently, the promoters of TCG group are AMD, HP, IBM, Intel and Microsoft but additional promoters are anticipated. Current contributors, including some Europeans, are ATi Technologies, Atmel, Broadcom Corporation, Comodo, Fujitsu Limited, Gemplus, Infineon, Legend Limited Group, National Semiconductor, Nokia, MTRU Cyrptosytems, nVidia, Phoenix, Philips, Rainbow Technologies, Seagate, Shang Hai Wellhope Information, Sony, Standard Microsystems, STMicroelectronics, Texas Instruments, Ultimaco Software AG, VeriSign and Wave Systems. Additional companies, such as Sun Microsystems,

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    9 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us