TCPA TCPA TCPA T rusted C omputing P latform A lliance Saurabh Phansalkar.

Slides:



Advertisements
Similar presentations
Software Bundle ViPNet Secure Remote Access Arrangement using ViPNet Mobile © Infotecs.
Advertisements

Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
Chapter 17: WEB COMPONENTS
Vpn-info.com.
1 Implementing an Untrusted Operating System on Trusted Hardware David Lie Chandramohan A. Thekkath Mark Horowitz University of Toronto, Microsoft Research,
The Italian Academic Community’s Electronic Voting System Pierluigi Bonetti Lisbon, May 2000.
Ragib Hasan Johns Hopkins University en Spring 2011 Lecture 3 02/14/2010 Security and Privacy in Cloud Computing.
Hardware Security: Trusted Platform Module Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Using Cryptographic ICs For Security and Product Management Misconceptions about security Network and system security Key Management The Business of Security.
Ragib Hasan Johns Hopkins University en Spring 2010 Lecture 5 03/08/2010 Security and Privacy in Cloud Computing.
Trusted Computing Initiative Beyond trustworthy. Trusted Computing  Five Key Concepts >Endorsement Key >Secure Input and Output >Memory Curtain / Protected.
FIT3105 Smart card based authentication and identity management Lecture 4.
SEC316: BitLocker™ Drive Encryption
CS 550 Amoeba-A Distributed Operation System by Saie M Mulay.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Trusted Computing Platform Alliance – Introduction and Technical Overview – Joe Pato HP Labs MIT 6.805/ October 2002.
FIT5037 Advanced Network Security --- Modern Computing and Security --- Lecture 1.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
Smart Card Deployment David Gautrey IT Manager – Microsoft New Zealaand Microsoft Corporation.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
Intranet, Extranet, Firewall. Intranet and Extranet.
Mobile Operating System Security A PRESENTATION BY DANIEL ADAMS CSC 345 DR. BOX.
Securing Applications With Firmware (Going Beyond TCPA Platform Security) Dr. Robert W. Baldwin Chief Scientist.
Not only Safe but Competitive Presentation to Copy Protection Technical Working Group October 22, 2003 Far East Engineering Corp, Tokyo Japan Makoto Saito/Rie.
WIRELESS LAN SECURITY Using
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Trusted Computing BY: Sam Ranjbari Billy J. Garcia.
BUSINESS B1 Information Security.
Trusted Computing Platform Alliance
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Extending user controlled security domain.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
Trusted Computing Or How I Learned to Stop Worrying and Love the MPAA.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
1 NEW GENERATION SECURE COMPUTING BASE. 2 INTRODUCTION  Next Generation Secure Computing Base,formerly known as Palladium.  The aim for palladium is.
PAPER PRESENTATION ON NETWORK SECURITY ISSUES BY M.D SAMEER YASMEEN SULTHANA.
Chapter 30 - Electronic Commerce and Business Introduction E-Commerce is Big Business –all commercial transactions conducted over the Internet shopping,
Middleware for Secure Environments Presented by Kemal Altıntaş Hümeyra Topcu-Altıntaş Osman Şen.
An Introduction to Trusted Platform Technology Siani Pearson Hewlett Packard Laboratories, UK
By Brian Sutherland and Chou Peter Hoang
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
06/02/06 Workshop on knowledge sharing using the new WWW tools May 30 – June 2, 2006 GROUP Presentation Group 5 Group Members Ambrose Ruyooka Emmanuel.
P ROTOCOL FOR COLLABORATING MOBILE AGENTS IN THE NETWORK INTRUSION DETECTION SYSTEMS. By Olumide Simeon Ogunnusi Shukor Abd Razak.
Trusted Computing and the Trusted Platform Module Bruce Maggs (with some slides from Bryan Parno)
“Trusted” Computing Platform Alliance Eric L. Frederich COT 4810 Nov. 4 th 2004.
CPT 123 Internet Skills Class Notes Internet Security Session B.
1 Information Security – Theory vs. Reality , Winter Lecture 12: Trusted computing architecture (cont.), Eran Tromer Slides credit:
What is BitLocker and How Does It Work? Steve Lamb IT Pro Evangelist, Microsoft Ltd
Information Systems Design and Development Security Precautions Computing Science.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
Presented by Mert Çetin
Trusted Computing and the Trusted Platform Module
Hardware security: The use of a Trusted Platform Module
Secure Software Confidentiality Integrity Data Security Authentication
Module 8: Securing Network Traffic by Using IPSec and Certificates
Innovations for Grid Security from Trusted Computing
CLIENT/SERVER COMPUTING ENVIRONMENT
Module 8: Securing Network Traffic by Using IPSec and Certificates
Erica Burch Jesse Forrest
Preparing for the Windows 8. 1 MCSA Module 6: Securing Windows 8
Presentation transcript:

TCPA TCPA TCPA T rusted C omputing P latform A lliance Saurabh Phansalkar

Key Topics Need Implementation Predecessor Possible Applications Palladium / DRM Concerns/ Misconceptions Additional Information Sources

Need for TCPA Internet Threat Trends Network attacks – better encryption techniques Server attacks – firewalls, intrusion detection Attacks through client PCs Effects E-business scope limited by lack of security/ trust Source: IBM Watson Research - Global Security Analysis Lab

Need for TCPA Solution Client based security system Combination of HW & SW

TCP - Alliance Initiated by Intel Formed by Intel, IBM, HP, Compaq, Microsoft Nearly 200 member companies Industry work group focused on enhancing trust by increasing security Source:

Mission Through the collaboration of HW, SW, communications, and technology vendors, drive and implement TCPA specifications for an enhanced HW and OS based trusted computing platform that implements trust into client, server, networking, and communication platforms Source:

Implementation “Fritz” Chip Smart card chip Mounted on LPC bus using I/O mapped registers Generates RSA public/private key pair Supported by client security software Source:

Implementation Functional groups within “Fritz” chip Public key functions Generation of a RSA public/ private key pair, verification of signatures, encryption & decryption Trusted boot functions Stores OS configuration information throughout the boot sequence in Platform Configuration Registers (PCR) Initialization & management functions On & off control of the fritz chip, reset chip Source:

Predecessor Embedded Security System (ESS) Offered by IBM for ThinkPad and NetVista Smart card chip placed on mother board Supported by client based software Source:

Applications Business 2 Environment Issues with authentication systems such as passwds, viruses/ trojans impose limitations on trust TCPA with biometrics/ smart cards provides 2- factor authentication “Integrity Metrics” used to determine trustworthiness Source:

Palladium Project at Microsoft to add trust in Windows Embedded in future Windows-OS Supported by SCP chip SCP would support Linux Unclear about compatibility with TCPA chip “Trusted Operating Root Architecture” will stop “Break Once Run Anywhere” (TORA-BORA) Source:

Digital Rights Management- DRM Copy protection of music/ video data Need palladium platform What will happen for a Disney VCD?? Source: Unique Integrity Metrics, CD Identification Disney Server

Concerns & Misconceptions Allows vendor to set rules Piracy threatened Allows excess control over PCs TCPA/ Palladium/ DRM are not the same TCPA is a subset of palladium DRM is one possible application of combined HW & SW TCPA does not control execution but it provides protection of private keys and encrypted data

Additional Information Founder company’s website