Trusted Computing BY: Sam Ranjbari Billy J. Garcia.

Slides:



Advertisements
Similar presentations
Copyright© 2006 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #1 Trusted Computing David Grawrock TPM.
Advertisements

Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
Vpn-info.com.
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Ragib Hasan Johns Hopkins University en Spring 2011 Lecture 3 02/14/2010 Security and Privacy in Cloud Computing.
 Alexandra Constantin  James Cook  Anindya De Computer Science, UC Berkeley.
Hardware Security: Trusted Platform Module Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources.
Trusted Computing Platforms Blessing or Curse? by Bastian Sopora, Seminar DRM 2006.
1 Minimal TCB Code Execution Jonathan McCune, Bryan Parno, Adrian Perrig, Michael Reiter, and Arvind Seshadri Carnegie Mellon University May 22, 2007.
1 Bootstrapping Trust in a “Trusted” Platform Carnegie Mellon University November 11, 2008 Bryan Parno.
Computer Viruses.
Ragib Hasan Johns Hopkins University en Spring 2010 Lecture 5 03/08/2010 Security and Privacy in Cloud Computing.
Trusted Platform Modules: Building a Trusted Software Stack and Remote Attestation Dane Brandon, Hardeep Uppal CSE551 University of Washington.
Trusted Computing Initiative Beyond trustworthy. Trusted Computing  Five Key Concepts >Endorsement Key >Secure Input and Output >Memory Curtain / Protected.
SEC316: BitLocker™ Drive Encryption
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Three.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture notes.
Trusted Computing Platform Alliance – Introduction and Technical Overview – Joe Pato HP Labs MIT 6.805/ October 2002.
outline Purpose Design Implementation Market Conclusion presentation Outline.
Securing Information Transfer in Distributed Computing Environments AbdulRahman A. Namankani.
Masud Hasan Secure Project 1. Secure It uses Digital Certificate combined with S/MIME capable clients to digitally sign and.
Digital Certificate Installation & User Guide For Class - 2 Certificates.
Security in the industry H/W & S/W What is AMD’s ”enhanced virus protection” all about? What’s coming next? Presented by: Micha Moffie.
© Paradigm Publishing Inc. 4-1 Chapter 4 System Software.
Bootstrapping Trust in Commodity Computers Bryan Parno, Jonathan McCune, Adrian Perrig 1 Carnegie Mellon University.
© Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential. Trusted Computing Yaron Sheffer Manager, Standards.
Patterns for Secure Boot and Secure Storage in Computer Systems By: Hans L¨ohr, Ahmad-Reza Sadeghi, Marcel Winandy Horst G¨ortz Institute for IT Security,
Chapter 4 System Software.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Week #7 Objectives: Secure Windows 7 Desktop
Trusted Computing Platform Alliance
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Extending user controlled security domain.
Architecture for Protecting Critical Secrets in Microprocessors Ruby Lee Peter Kwan Patrick McGregor Jeffrey Dwoskin Zhenghong Wang Princeton Architecture.
Trusted Computing Or How I Learned to Stop Worrying and Love the MPAA.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
1 NEW GENERATION SECURE COMPUTING BASE. 2 INTRODUCTION  Next Generation Secure Computing Base,formerly known as Palladium.  The aim for palladium is.
Cosc 4765 Trusted Platform Module. What is TPM The TPM hardware along with its supporting software and firmware provides the platform root of trust. –It.
© Paradigm Publishing Inc. 4-1 OPERATING SYSTEMS.
出處 :2010 2nd International Conference on Signal Processing Systems (ICSPS) 作者 :Zhidong Shen 、 Qiang Tong 演講者 : 碩研資管一甲 吳俊逸.
An Introduction to Trusted Platform Technology Siani Pearson Hewlett Packard Laboratories, UK
Trusted Computing and the Trusted Platform Module Bruce Maggs (with some slides from Bryan Parno)
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Trusted Infrastructure Xiaolong Wang, Xinming Ou Based on Dr. Andrew Martin’s slides from TIW 2013.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Trusted Computing and the Trusted Platform Module Bruce Maggs (with some slides from Bryan Parno)
Information Technology Essentials Deloris Y. McBride.
Understand Encryption LESSON 2.5_A Security Fundamentals.
Lecture 1: Network Operating Systems (NOS) An Introduction.
Introduction TO Network Administration
What is BitLocker and How Does It Work? Steve Lamb IT Pro Evangelist, Microsoft Ltd
Computer Security module October 2008 Mark D. Ryan HP Labs, Bristol University of Birmingham Trusted Platform Module (TPM) introduction.
© 2015 Digital Rights Management in a 3G Mobile Phone and Beyond Thomas S.Messerges, Ezzat A. Dabbish ILKOO LEE.
Computer Security module October 2009 Mark D. Ryan University of Birmingham Trusted Platform Module (TPM) introduction.
Presented by Mert Çetin
Nat 4/5 Computing Science Software
Trusted Computing and the Trusted Platform Module
Protecting Network Equipment
Hardware security: The use of a Trusted Platform Module
Trusted Computing and the Trusted Platform Module
Outline What does the OS protect? Authentication for operating systems
Outline What does the OS protect? Authentication for operating systems
Aimee Coughlin, Greg Cusack, Jack Wampler, Eric Keller, Eric Wustrow
Erica Burch Jesse Forrest
Bruce Maggs (with some slides from Bryan Parno)
Bruce Maggs (with some slides from Bryan Parno)
Presentation transcript:

Trusted Computing BY: Sam Ranjbari Billy J. Garcia

What is it? Trusted Computing (TC) is an open standard for hardware enabled trusted computing and security technologies. This means a more secure PC that only trusts the software creators not the owner

Trusted Computing TC was created by the non-for-profit organization Trusted Computing Group (TCG); TC was created by the non-for-profit organization Trusted Computing Group (TCG); An alliance of Microsoft, Intel, IBM, HP, AMD and … An alliance of Microsoft, Intel, IBM, HP, AMD and … A list can be found at this link bout/members/ A list can be found at this link bout/members/ bout/members/ bout/members/

What does Trust mean? Trust means that something does as it is intended to do Trust means that something does as it is intended to do TCG defines trust as “an entity can be trusted if it always behaves in the expected manner for the intended purpose”. TCG defines trust as “an entity can be trusted if it always behaves in the expected manner for the intended purpose”. For example, when you save or read something from your hard drive, you want the data to be written and read accurately like it is intended to be, but you have to trust it to write and read without errors. For example, when you save or read something from your hard drive, you want the data to be written and read accurately like it is intended to be, but you have to trust it to write and read without errors.

Who do I trust? Me! Today a computer trusts one of two entities in a user and hacker model. Today a computer trusts one of two entities in a user and hacker model. The user is trusted and the hacker is not. The user is trusted and the hacker is not.

Continue But when does a computer know that the user is not doing something harmful? But when does a computer know that the user is not doing something harmful? With TC the user and the hacker are both not trusted. This ensures that nothing is done that can compromise the security of the PC. With TC the user and the hacker are both not trusted. This ensures that nothing is done that can compromise the security of the PC.

So How does TC work? For TC to work you have to use the Trusted Computing Module (TPM) which is a hardware system where the core (root) of trust in the platform will reside. For TC to work you have to use the Trusted Computing Module (TPM) which is a hardware system where the core (root) of trust in the platform will reside. TPM will be implemented using a security microchip that handles security with encryption. TPM will be implemented using a security microchip that handles security with encryption.

Groups of secure hardware They are memory curtaining, secure input and output, sealed storage, and remote attestation. They are memory curtaining, secure input and output, sealed storage, and remote attestation. It is also important to mention the concept of the endorsement key. It is also important to mention the concept of the endorsement key. The endorsement key is a 1,048 bit RSA private and public key that is created randomly on a microchip during the manufacturing of the chip. The private key is only used by the chip while the public key is used for attestation and for the encryption of sensitive data sent to the chip. The endorsement key is a 1,048 bit RSA private and public key that is created randomly on a microchip during the manufacturing of the chip. The private key is only used by the chip while the public key is used for attestation and for the encryption of sensitive data sent to the chip.

endorsement key The key is used to allow secure transactions by the TPM using a protocol created by TCG. This prevents a TPM emulator from starting a trusted entity. TPM is also designed to prevent extraction of the key from hardware analysis The key is used to allow secure transactions by the TPM using a protocol created by TCG. This prevents a TPM emulator from starting a trusted entity. TPM is also designed to prevent extraction of the key from hardware analysis

…Groups of secure Hardware Memory curtaining is hardware enforced memory isolation that will prevent software from being able to read or write to other software’s memory. Memory curtaining is hardware enforced memory isolation that will prevent software from being able to read or write to other software’s memory. Today hackers can read memory and alter applications’ memory to do evil deeds that are not intended. Today hackers can read memory and alter applications’ memory to do evil deeds that are not intended.

…Groups of secure Hardware Secure input and output will prevent threats from key loggers or screen grabbers from intruders. Secure input and output will prevent threats from key loggers or screen grabbers from intruders. Using encrypted input and output will prevent the intruders from being able to see what the user types or what is on the users screen because the input from the keyboard to the software and the output from the software to the screen are encrypted. Using encrypted input and output will prevent the intruders from being able to see what the user types or what is on the users screen because the input from the keyboard to the software and the output from the software to the screen are encrypted.

…Groups of secure Hardware Today hard drives are insecure by storing cryptographic keys on a hard drive that intruders can access. Today hard drives are insecure by storing cryptographic keys on a hard drive that intruders can access. User’s passwords, documents, and other information are also unprotected on today’s storage. User’s passwords, documents, and other information are also unprotected on today’s storage.

…Groups of secure Hardware With sealed storage the keys are generated using the hardware and the software With sealed storage the keys are generated using the hardware and the software For example, when you install a client on a set of hardware a key is generated and used for the data that is saved and read from the client. For example, when you install a client on a set of hardware a key is generated and used for the data that is saved and read from the client. If a virus is running on the PC it will not be able to read the because the virus and the hardware combo generate a different key! If a virus is running on the PC it will not be able to read the because the virus and the hardware combo generate a different key!

…Groups of secure Hardware With remote attestation a certificate is generated in hardware of the software installed and running on a computer. With remote attestation a certificate is generated in hardware of the software installed and running on a computer. This allows software writers to check and ensure that their software is unmodified and has not been hacked. This allows software writers to check and ensure that their software is unmodified and has not been hacked. Identity of the software is verified with a hash that will change if the software has been changed. Identity of the software is verified with a hash that will change if the software has been changed. Since the hash is compared to a remote hash the intruder has no way of forging altered software. Since the hash is compared to a remote hash the intruder has no way of forging altered software.

Trusted Computing Not only TC is used for PCs but it is also going to be used for more hardware such as set top boxes, mobile phones, servers, storage devices, networks and more. Not only TC is used for PCs but it is also going to be used for more hardware such as set top boxes, mobile phones, servers, storage devices, networks and more.

Trusted Computing So when will we see TC being used? So when will we see TC being used? For TC to work you have to have hardware with the TPM, and software to work with the TPM. Windows Vista is the next generation operating system by Microsoft that will make use of TC, although Microsoft likes to call it Trustworthiness. For TC to work you have to have hardware with the TPM, and software to work with the TPM. Windows Vista is the next generation operating system by Microsoft that will make use of TC, although Microsoft likes to call it Trustworthiness.

Trusted Computing So far both AMD and Intel are working on a new processor to use TPM. So far both AMD and Intel are working on a new processor to use TPM. Well, who would want to use TC? Well, who would want to use TC? So far the computer industry is supporting TC and the Army wants all of their computers by 2010 to use a secure model such as TC. So far the computer industry is supporting TC and the Army wants all of their computers by 2010 to use a secure model such as TC.

Use of Trusted Computing Other software that uses TC are openTC, EMSCB, Forum for Open SW based TC, Enforcer, Next-Generation Secure Computing Base (NGSCB), TruoSerS – The open-source TCG Software Stack, and Trusted Java. Other software that uses TC are openTC, EMSCB, Forum for Open SW based TC, Enforcer, Next-Generation Secure Computing Base (NGSCB), TruoSerS – The open-source TCG Software Stack, and Trusted Java.

Conclusion Trusted Computing is an industry standard created to protect a user from intruders and unsafe actions. Trusted Computing is an industry standard created to protect a user from intruders and unsafe actions. With Trusted Computing the PC will decide who should be trusted and what is safe and unsafe using the Trusted Platform Module. With Trusted Computing the PC will decide who should be trusted and what is safe and unsafe using the Trusted Platform Module. By default no one is trusted except the hardware and the software publishers. Not even the PC users are trusted. TC was created for our benefits for sure… By default no one is trusted except the hardware and the software publishers. Not even the PC users are trusted. TC was created for our benefits for sure…

Trusted-Platform-Module