The Trusted Platform Module Specifications

The Trusted Platform Module Specifications

The Trusted Platform Module Specifications Patrick George Gemplus Copyright© 2005 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #1 Overall Presentation Goals • Introduce the Trusted Computing Group (TCG) • Provide a medium/high level view of the Trusted Platform Module (TPM) – Architecture – Functionality –Use cases • Discuss the relationships between smart cards and TPM in Trusted Computing architectures Copyright© 2005 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #2 TCG Mission Develop and promote open, vendor- neutral, industry standard specifications for trusted computing building blocks and software interfaces across multiple platforms Copyright© 2005 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #3 TCG Structure • TCG is incorporated as a not-for-profit corporation, with international membership – Open membership model • Offers multiple membership levels: Promoters, Contributors, and Adopters – Board of Directors • Promoters and member elected Contributors – Typical not-for-profit bylaws – Industry typical patent policy (Reasonable and Non Discriminatory) for all published specifications – Working Groups Copyright© 2005 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #4 TCG Organization Board of Directors Jim Ward, IBM, President and Chairman, Geoffrey Strongin, AMD, Mark Schiller, HP, David Riss, Intel, Steve Heil, Microsoft, Tom Tahan, Sun, Nicholas Szeto, Sony, Bob Thibadeau, Seagate, Thomas Hardjono, VeriSign Marketing Workgroup Technical Committee Advisory Council Administration Brian Berger, Wave Systems Graeme Proudler, HP Invited Participants VTM, Inc. Public TPM Work Group Conformance WG Relations David Grawrock, Intel Randy Mummert, Atmel Anne Price, PR Works TSS Work Group PC Client WG Position Key David Challener, Lenovo Monty Wiseman, Intel GREEN Box: Elected Officers Events BLUE Box: Chairs Appointed by Board RED Box: Chairs Nominated by WG, Marketing Infrastructure WG Mobile Phone WG Appointed by Board Support Janne Uusilehto, Nokia Thomas Hardjono, VeriSign Ned Smith, Intel BLACK Box: Resources Contracted by TCG VTM, Inc. Peripherals WG Storage Systems Colin Walters, Comodo Robert Thibadeau, Seagate Server Specific WG Larry McMahan, HP Hard Copy WG Marty Nicholes, HP Brian Volkoff, HP Copyright© 2005 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #5 TCG Membership 110 Total Members as of August 18, 2005 7 Promoter, 71 Contributor, 32 Adopter Promoters Contributors Contributors Adopters Fujitsu Siemens Computers Renesas Technology Corp. Advanced Network Technology Labs AMD Funk Software, Inc. Ricoh Company LTD Apani Networks Hewlett-Packard Gemplus RSA Security, Inc. Apere, Inc. IBM General Dynamics C4 Systems SafeNet, Inc. BigFix, Inc. Intel Corporation Giesecke & Devrient Samsung Electronics Co. Bradford Networks Microsoft Hitachi, Ltd. SCM Microsystems, Inc. Caymas Systems Infineon Seagate Technology Cirond Sony Corporation InfoExpress, Inc. SignaCert, Inc. CPR Tools, Inc. Sun Microsystems, Inc. InterDigital Communications Credant Technologies iPass Sinosun Technology Co., Ltd. Fiberlink Communications Contributors Lenovo Holdings Limited SMSC Foundry Networks Inc. Agere Systems Lexmark International STMicroelectronics Foundstone, Inc. American Megatrends, Inc. M-Systems Flash Disk Pioneers Sygate Technologies, Inc. Industrial Technology Research Institute ARM Meetinghouse Data Symantec Infosec Corporation ATI Technologies Inc. Communications Symbian Ltd Lockdown Networks Atmel Mirage Networks Synaptics Inc. Marvell Semiconductor, Inc. AuthenTec, Inc. Motorola Inc. Texas Instruments MCI AVAYA National Semiconductor Trend Micro PC Guardian Technologies Broadcom Corporation nCipher TriCipher, Inc. Safend Certicom Corp. NEC UPEK, Inc. Sana Security Citrix Systems, Inc. Network Associates Utimaco Safeware AG Senforce Technologies, Inc Comodo Nevis Networks, USA VeriSign, Inc. Silicon Integrated Systems Corp. Dell, Inc. Nokia Vernier Networks Silicon Storage Technology, Inc. Endforce, Inc. NTRU Cryptosystems, Inc. Vodafone Group Services LTD Softex, Inc. Ericsson Mobile Platforms AB NVIDIA Wave Systems StillSecure Extreme Networks OSA Technologies, Inc Winbond Electronics Swan Island Networks, Inc. France Telecom Group Philips Corporation Telemidic Co. Ltd. Freescale Semiconductor Phoenix Zone Labs, Inc. Toshiba Corporation Fujitsu Limited Pointsec Mobile Technologies ULi Electronics Inc. Unisys Websense Copyright© 2005 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #6 TCG Specifications • Trusted Platform Module (TPM) Specification 1.2 • TCG Software Stack (TSS) Specification 1.1 • TCG PC Specific Implementation Specification 1.1 • Infrastructure Specifications – Reference Architecture for Interoperability – Trusted Network Connect (TNC) specifications • Generic Server Specification Copyright© 2005 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #7 Trusted Platform • A platform is trusted if it always behaves in the expected manner for the intended purpose – Is the platform what it claims to be? – Has the platform been modified or compromised? – How are the secrets stored by the platform protected? – Does it embed a genuine TPM? Copyright© 2005 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #8 Trusted Platform Module (TPM) • A silicon chip that performs all TPM v1.x functions, including: – Store platform integrity measurement – Generate and store a private key – Hash files using SHA-1 – Create digital signatures – Anchor chain of trust for keys, digital certificates and other credentials Copyright© 2005 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #9 TPM Architecture • Turnkey secure module – Internal CPU to implement all TPM commands – Internal math engine to accelerate computation of asymmetric algorithm operations – Tamper resistance to prevent physical attacks that might reveal TPM or user secrets (EAL3+ min. required) – Communications channel to main processor (LPC typical) • Non-volatile memory – Owner information (on/off, owner auth secret, configuration) – Platform attestation information • Integrity metrics storage – Multiple instances of Platform Configuration Registers (PCR) – Can be extended (hash with new value) but not cleared – Key usage can be connected to desired values – Platform can provide attestation of current values Copyright© 2005 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #10 TPM Architecture (cont’d) • Asymmetric cryptography engine – RSA support mandatory (512 through 2048 bit key length), other algorithms optional. On board key generation. – On board key cache stores frequently used keys, arbitrary number stored on disk. Off chip keys are protected using key that never leaves TPM. – Keys can be migrated from one TPM to another – if both the TPM owner and the key owner authorize the operation and if the key has been appropriately tagged at creation • High quality random number generator – Used to prevent replay attacks, generate random keys • SHA-1 hash computation engine – Multiple uses: integrity, authorization, PCR extension, etc. Copyright© 2005 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #11 TPM Block Diagram Platform Attestation Non-Volatile Program Configuration Identity Storage Code Register (PCR) Key (AIK) I/O Random SHA-1 Key RSA Exec Communications Communications Number Opt-In Engine Generation Engine Engine Generator Trusted Platform Module (TPM) Tamper-Protected Packaging Copyright© 2005 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #12 TPM 1.1b Functions • Asymmetric key functions – On-chip key pair generation – Digital signature – Encryption/decryption of keys • Secure storage and secure reporting of platform configuration information – Enable verifiable attestation of the platform configuration – Including creation of Attestation Identity Keys (AIK) • An Endorsement Key (EK) – Anonymously establish that AIK were generated in a TPM • Initialization and management functions – Allow platform owner to turn functionality on or off – Reset the chip – Take ownership while protecting the user privacy –Opt-in Copyright© 2005 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #13 Integrity Measures Platform TPM PCR 12345678 Reports 90ABCD… 12345678 90ABCD… etc… Reports Measures Measures CRTM Copyright© 2005 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #14 Platform Identities Platform TPM AIK Privacy CA Alias EK Copyright© 2005 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #15 Platform Attestation Platform TPM PCR AIK 12345678 90ABCD… 12345678 90ABCD… Verify 12345678 90ABCD… 12345678 90ABCD… Challenger Copyright© 2005 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #16 Sealed Storage Platform TPM PCR 12345678 SRK 90ABCD… 12345678 90ABCD… Condition usage Seal 12345678 90ABCD… 12345678 90ABCD… Copyright© 2005 Trusted Computing Group - Other names and brands are

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    32 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us