Presentation is loading. Please wait.

Presentation is loading. Please wait.

Trusted Computing Initiative Beyond trustworthy. Trusted Computing  Five Key Concepts >Endorsement Key >Secure Input and Output >Memory Curtain / Protected.

Similar presentations


Presentation on theme: "Trusted Computing Initiative Beyond trustworthy. Trusted Computing  Five Key Concepts >Endorsement Key >Secure Input and Output >Memory Curtain / Protected."— Presentation transcript:

1 Trusted Computing Initiative Beyond trustworthy

2 Trusted Computing  Five Key Concepts >Endorsement Key >Secure Input and Output >Memory Curtain / Protected Execution >Sealed Storage >Remote Attestation

3 What is Trusted Computing  Enhanced Hardware >TPM – Trusted Program Module  Encryption Chip (aka Fritz)  Secure Key Store  BIOS support  Used in IPL (Initial Program Load) >Aka Booting  Also used in encryption to avoid software >E.g Bitlocker, encrypted drives

4 Trusted Computing  Trusted Computing Group >Manufacturer Consortium >Control TPM specification  Required for US DoD equipment  TPM available on many systems (e.g. Dell, Toshiba)  Proposal: Trusted Network Connect  Further: >Next-Generation Secure Computing Base ­Aka Palladium ­Is Trusted Computing in Vista ­Some dilution – to avoid lockouts

5 TPM

6 Endorsement Key  Each TPM provides a unique internal Key  A RSA 2048 bit public/private key pair  Created randomly in chip manufacture  Private key never leaves chip and is secure  Public key used for encryption of data sent to chip  Chip memory and processes are hidden

7 Secure I/O  Also known as a trusted path  I/O can be secured with encryption keys  Motherboard paths secured by TPM  TPM must be bonded to motherboard so it cannot be reused elsewhere

8 Memory Curtain/ Protected Execution  Internal memory and computation of TPM is not visible  Motherboard may have memory hidden from Operating System  Can be implemented by some BIOS

9 Sealed Storage  TPM has its own endorsement store locked by internal keys

10 Remote Attestation  Certification originated from individual keys and identities of TPM

11 Application of Trusted Computing  Tamperproof booting >Uses TPM to compute secure signatures >Uses this to endorse each stage in the boot  BIOS uses TPM to identify authorised MBR >By storing measurement of MBR in TPM  MBR uses TPM to identify authorised IPL >E.g. boot loader  IPL uses TPM to identify authorised OS >E.g. Loads Windows after authentication

12 Application of Trusted Computing  Protecting Hard Drive Data >Uses Key Store & Encryption of TPM >Bitlocker in Windows >Enforcer in Linux  Can be done wrongly >Security boffins unveil BitUnlocker- Disk encryption decryptedSecurity boffins unveil BitUnlocker- Disk encryption decrypted  Or correctly >Bitlocker hack is easily prevented, Microsoft says - Restoring Vista disk crypto's good nameBitlocker hack is easily prevented, Microsoft says - Restoring Vista disk crypto's good name

13 Further Applications  Digital Rights Management >Authenticating Media Player Application >Authenticating Right to Media  Bootleg Software Prevention >Using TPM bootlegs cannot be loaded and used >Enforces Copyright  Identity Theft Prevention  Protection from Malware  Cheat Prevention in Online Games

14 The problems  Hardware Change Renders Software Inoperable  Hardware Change Renders Data Unreadable  Humans are Fallible >They Forget Keys!  Enforces Software Monopoly >Unable to modify & improve software  Protects Big Money Media >Users not in control of data  Independent Software & Media Harmed  People no Longer in Control of their own computer!  Enforced Censorship  Loss of anonymity & privacy

15 Trusted Computing and Virtualisation  TPM can be used with Virtual PCs  Establish a chain of trust links from BIOS  Tree-of-Trust

16 Bibliography  Trusted Computing in Wikipedia Trusted Computing in Wikipedia  TPM entry in Wikipedia TPM entry in Wikipedia  Trusted Computing Group in Wikipedia Trusted Computing Group in Wikipedia

17


Download ppt "Trusted Computing Initiative Beyond trustworthy. Trusted Computing  Five Key Concepts >Endorsement Key >Secure Input and Output >Memory Curtain / Protected."

Similar presentations


Ads by Google