Bachelors Thesis: A Certification Service for future Home Networks - - PowerPoint PPT Presentation

bachelor s thesis a certification service for future home
SMART_READER_LITE
LIVE PREVIEW

Bachelors Thesis: A Certification Service for future Home Networks - - PowerPoint PPT Presentation

Lehrstuhl Netzarchitekturen und Netzdienste Institut fr Informatik TU Mnchen Bachelors Thesis: A Certification Service for future Home Networks based on Trusted Computing Technology Announcement: Prof. Georg Carle Advisor: Holger


slide-1
SLIDE 1

Lehrstuhl Netzarchitekturen und Netzdienste Institut für Informatik TU München

Bachelor‘s Thesis: A Certification Service for future Home Networks based on Trusted Computing Technology

Announcement: Prof. Georg Carle Advisor: Holger Kinkelin Student: Simon Mittelberger Lehrstuhl für Netzarchitekturen und Netzdienste TU München

slide-2
SLIDE 2

Bachelor Thesis SS 2009 2

Agenda

 Existing Approach  Security Analysis / Motivation  Key Requirements  Approach  Evaluation  Related Work  Conclusion & Future Work

slide-3
SLIDE 3

Bachelor Thesis SS 2009 3

AutHoNe’s PKI

slide-4
SLIDE 4

Bachelor Thesis SS 2009 4

Trust Relationship

slide-5
SLIDE 5

Bachelor Thesis SS 2009 5

Trust Relationship

slide-6
SLIDE 6

Bachelor Thesis SS 2009 6

Security Analysis / Motivation

Home Key and Device Key are in Danger

 Identity Theft  Treacherous Home  Treacherous Device

slide-7
SLIDE 7

Bachelor Thesis SS 2009 7

Trust Relationship

slide-8
SLIDE 8

Bachelor Thesis SS 2009 8

Identity Theft

slide-9
SLIDE 9

Bachelor Thesis SS 2009 9

Identity Theft

slide-10
SLIDE 10

Bachelor Thesis SS 2009 10

Identity Theft

slide-11
SLIDE 11

Bachelor Thesis SS 2009 11

Identity Theft

slide-12
SLIDE 12

Bachelor Thesis SS 2009 12

Treacherous Device

slide-13
SLIDE 13

Bachelor Thesis SS 2009 13

Treacherous Device

slide-14
SLIDE 14

Bachelor Thesis SS 2009 14

 R1 Protection of the Private Key

  • Home Key
  • Device Key

 R2 Prove Protection to other Entities  R3 Backup of the Home Key

Key Requirements

slide-15
SLIDE 15

Bachelor Thesis SS 2009 15

 Private part of a Key managed through a TPM is never readable from

the outside => R1 (Protection)

 Protection and type of protection is provable => R2 (Proof)  Certain Migration Schemes allow a Migration of a Key to another TPM

=> R3 (Backup)

Approach

Use a Trusted Platform Module (TPM) for Management of the Key

slide-16
SLIDE 16

Bachelor Thesis SS 2009 16

Important Keys in a TPM

 Endorsement Key (EK): unique for every TPM, can only sign internal

data, not migratable

 Attestation Identity Key (AIK): derives from EK, can only sign internal

data, not migratable

 Signing Key (SK): only signing operations of internal and external data,

migratable/not migratable

 Legacy Key (LK): signing and encryption operations of internal and

external data, migratable/not migratable

slide-17
SLIDE 17

Bachelor Thesis SS 2009 17

Current AutHoNe PKI

slide-18
SLIDE 18

Bachelor Thesis SS 2009 18

AutHoNe TPM Integration

slide-19
SLIDE 19

Bachelor Thesis SS 2009 19

TPM Credentials

slide-20
SLIDE 20

Bachelor Thesis SS 2009 20

TPM Credentials - Migratability

slide-21
SLIDE 21

Bachelor Thesis SS 2009 21

Evaluation

No TPM Protection Migratable Key Non Migratable Key Usability - Backup of Key Possible Attacks

  • Identity Theft
  • Treacherous Device
  • Treacherous Home
slide-22
SLIDE 22

Bachelor Thesis SS 2009 22

Evaluation

No TPM Protection Migratable Key Non Migratable Key Usability - Backup of Key

  • Backup of Key

Possible Attacks

  • Identity Theft
  • Treacherous Device
  • Treacherous Home
  • Treacherous Device
  • Treacherous Home
slide-23
SLIDE 23

Bachelor Thesis SS 2009 23

Evaluation

No TPM Protection Migratable Key Non Migratable Key Usability - Backup of Key

  • Backup of Key
  • No Backup of Key

Possible Attacks

  • Identity Theft
  • Treacherous Device
  • Treacherous Home
  • Treacherous Device
  • Treacherous Home
  • Treacherous Home
slide-24
SLIDE 24

Bachelor Thesis SS 2009 24

Treacherous Home

slide-25
SLIDE 25

Bachelor Thesis SS 2009 25

Evaluation

 Trade off between usability and security caused by migratability

  • Migratable Key = weak security, strong usability
  • Non Migratable Key = strong security, weak usability

No TPM Protection Migratable Key Non Migratable Key Usability - Backup of Key

  • Backup of Key
  • No Backup of Key

Possible Attacks

  • Identity Theft
  • Treacherous Device
  • Treacherous Home
  • Treacherous Device
  • Treacherous Home
  • Treacherous Home
slide-26
SLIDE 26

Bachelor Thesis SS 2009 26

Performance

 Performance of the Device Registration Process

slide-27
SLIDE 27

Bachelor Thesis SS 2009 27

Performance

 Performance of the Device Registration Process

Device Device with TPM Create CSR 0.697s 1.169s Process CSR through HCS 1.261s 1.427s Process CSR through Device 0.555s 0.815s

*Times without loading time and network transmissions

slide-28
SLIDE 28

Bachelor Thesis SS 2009 28

Technical Limitations

 Infrastructure is not completed

  • PCA does not exist yet (only proof of concept)
  • Not all TPM Manufacturers ship the EK Certificates
  • Other Certificates unavailable
  • Migration Infrastructure is incomplete
slide-29
SLIDE 29

Bachelor Thesis SS 2009 29

Related Work: SKAE

slide-30
SLIDE 30

Bachelor Thesis SS 2009 30

SKAE vs. this Approach

 AIK signs Key directly

=> no migratability

 No outstanding

benefit, reached through SKAE

 CA PCA: central entities involved in the process

=> overhead

slide-31
SLIDE 31

Bachelor Thesis SS 2009 31

Conclusion

 Main Goal achieved:

Private Home Key is protected through a TPM

 Design is dynamic and applicable also on a Device  Trade off:

usability vs. security <=> migratability vs. non migratability

 Trade off at users side

slide-32
SLIDE 32

Bachelor Thesis SS 2009 32

Future Work

 Infrastructure has to be completed  Exploit advantages of provable TPM protection

  • Trust Level leads to Access Level
slide-33
SLIDE 33

Bachelor Thesis SS 2009 33

Questions?

slide-34
SLIDE 34

Bachelor Thesis SS 2009 34

Literature

 Thomas Müller – Trusted Computing Systeme  Trusted Computing Group – TPM Specification Part 1, Part 2, Part 3

http://www.trustedcomputinggroup.org/resources/ tpm_specification_version_12_revision_103_part_1__3/

 TCG Infrastructure Workgroup – Subject Key Attestation Evidence

http://www.trustedcomputinggroup.org/files/resource_files/ 876A7F79-1D09-3519-AD321B21144AE93C/ IWG_SKAE_Extension_1-00.pdf

 IAIK TU Graz - Trusted Computing for the JAVA Platform

http://trustedjava.sourceforge.net/

 Simon Mittelberger – A Certification Service for future Home Networks

based on Trusted Computing Technology