Download presentation
Presentation is loading. Please wait.
1
Trusted Computing Initiative Beyond trustworthy
2
Trusted Computing Five Key Concepts >Endorsement Key >Secure Input and Output >Memory Curtain / Protected Execution >Sealed Storage >Remote Attestation
3
What is Trusted Computing Enhanced Hardware >TPM – Trusted Program Module Encryption Chip (aka Fritz) Secure Key Store BIOS support Used in IPL (Initial Program Load) >Aka Booting Also used in encryption to avoid software >E.g Bitlocker, encrypted drives
4
Trusted Computing Trusted Computing Group >Manufacturer Consortium >Control TPM specification Required for US DoD equipment TPM available on many systems (e.g. Dell, Toshiba) Proposal: Trusted Network Connect Further: >Next-Generation Secure Computing Base Aka Palladium Is Trusted Computing in Vista Some dilution – to avoid lockouts
5
TPM
6
Endorsement Key Each TPM provides a unique internal Key A RSA 2048 bit public/private key pair Created randomly in chip manufacture Private key never leaves chip and is secure Public key used for encryption of data sent to chip Chip memory and processes are hidden
7
Secure I/O Also known as a trusted path I/O can be secured with encryption keys Motherboard paths secured by TPM TPM must be bonded to motherboard so it cannot be reused elsewhere
8
Memory Curtain/ Protected Execution Internal memory and computation of TPM is not visible Motherboard may have memory hidden from Operating System Can be implemented by some BIOS
9
Sealed Storage TPM has its own endorsement store locked by internal keys
10
Remote Attestation Certification originated from individual keys and identities of TPM
11
Application of Trusted Computing Tamperproof booting >Uses TPM to compute secure signatures >Uses this to endorse each stage in the boot BIOS uses TPM to identify authorised MBR >By storing measurement of MBR in TPM MBR uses TPM to identify authorised IPL >E.g. boot loader IPL uses TPM to identify authorised OS >E.g. Loads Windows after authentication
12
Application of Trusted Computing Protecting Hard Drive Data >Uses Key Store & Encryption of TPM >Bitlocker in Windows >Enforcer in Linux Can be done wrongly >Security boffins unveil BitUnlocker- Disk encryption decryptedSecurity boffins unveil BitUnlocker- Disk encryption decrypted Or correctly >Bitlocker hack is easily prevented, Microsoft says - Restoring Vista disk crypto's good nameBitlocker hack is easily prevented, Microsoft says - Restoring Vista disk crypto's good name
13
Further Applications Digital Rights Management >Authenticating Media Player Application >Authenticating Right to Media Bootleg Software Prevention >Using TPM bootlegs cannot be loaded and used >Enforces Copyright Identity Theft Prevention Protection from Malware Cheat Prevention in Online Games
14
The problems Hardware Change Renders Software Inoperable Hardware Change Renders Data Unreadable Humans are Fallible >They Forget Keys! Enforces Software Monopoly >Unable to modify & improve software Protects Big Money Media >Users not in control of data Independent Software & Media Harmed People no Longer in Control of their own computer! Enforced Censorship Loss of anonymity & privacy
15
Trusted Computing and Virtualisation TPM can be used with Virtual PCs Establish a chain of trust links from BIOS Tree-of-Trust
16
Bibliography Trusted Computing in Wikipedia Trusted Computing in Wikipedia TPM entry in Wikipedia TPM entry in Wikipedia Trusted Computing Group in Wikipedia Trusted Computing Group in Wikipedia
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.