bachelor s thesis a certification service for future home
play

Bachelors Thesis: A Certification Service for future Home Networks - PowerPoint PPT Presentation

Lehrstuhl Netzarchitekturen und Netzdienste Institut fr Informatik TU Mnchen Bachelors Thesis: A Certification Service for future Home Networks based on Trusted Computing Technology Announcement: Prof. Georg Carle Advisor: Holger


  1. Lehrstuhl Netzarchitekturen und Netzdienste Institut für Informatik TU München Bachelor‘s Thesis: A Certification Service for future Home Networks based on Trusted Computing Technology Announcement: Prof. Georg Carle Advisor: Holger Kinkelin Student: Simon Mittelberger Lehrstuhl für Netzarchitekturen und Netzdienste TU München

  2. Agenda  Existing Approach  Security Analysis / Motivation  Key Requirements  Approach  Evaluation  Related Work  Conclusion & Future Work Bachelor Thesis SS 2009 2

  3. AutHoNe’s PKI Bachelor Thesis SS 2009 3

  4. Trust Relationship Bachelor Thesis SS 2009 4

  5. Trust Relationship Bachelor Thesis SS 2009 5

  6. Security Analysis / Motivation Home Key and Device Key are in Danger  Identity Theft  Treacherous Home  Treacherous Device Bachelor Thesis SS 2009 6

  7. Trust Relationship Bachelor Thesis SS 2009 7

  8. Identity Theft Bachelor Thesis SS 2009 8

  9. Identity Theft Bachelor Thesis SS 2009 9

  10. Identity Theft Bachelor Thesis SS 2009 10

  11. Identity Theft Bachelor Thesis SS 2009 11

  12. Treacherous Device Bachelor Thesis SS 2009 12

  13. Treacherous Device Bachelor Thesis SS 2009 13

  14. Key Requirements  R1 Protection of the Private Key  Home Key  Device Key  R2 Prove Protection to other Entities  R3 Backup of the Home Key Bachelor Thesis SS 2009 14

  15. Approach Use a Trusted Platform Module (TPM) for Management of the Key  Private part of a Key managed through a TPM is never readable from the outside => R1 (Protection)  Protection and type of protection is provable => R2 (Proof)  Certain Migration Schemes allow a Migration of a Key to another TPM => R3 (Backup) Bachelor Thesis SS 2009 15

  16. Important Keys in a TPM  Endorsement Key (EK): unique for every TPM, can only sign internal data, not migratable  Attestation Identity Key (AIK): derives from EK, can only sign internal data, not migratable  Signing Key (SK): only signing operations of internal and external data, migratable/not migratable  Legacy Key (LK): signing and encryption operations of internal and external data, migratable/not migratable Bachelor Thesis SS 2009 16

  17. Current AutHoNe PKI Bachelor Thesis SS 2009 17

  18. AutHoNe TPM Integration Bachelor Thesis SS 2009 18

  19. TPM Credentials Bachelor Thesis SS 2009 19

  20. TPM Credentials - Migratability Bachelor Thesis SS 2009 20

  21. Evaluation No TPM Protection Migratable Key Non Migratable Key Usability - Backup of Key - Identity Theft Possible - Treacherous Device Attacks - Treacherous Home Bachelor Thesis SS 2009 21

  22. Evaluation No TPM Protection Migratable Key Non Migratable Key Usability - Backup of Key - Backup of Key - Identity Theft Possible - Treacherous Device - Treacherous Device Attacks - Treacherous Home - Treacherous Home Bachelor Thesis SS 2009 22

  23. Evaluation No TPM Protection Migratable Key Non Migratable Key Usability - Backup of Key - Backup of Key - No Backup of Key - Identity Theft Possible - Treacherous Device - Treacherous Device Attacks - Treacherous Home - Treacherous Home - Treacherous Home Bachelor Thesis SS 2009 23

  24. Treacherous Home Bachelor Thesis SS 2009 24

  25. Evaluation  Trade off between usability and security caused by migratability  Migratable Key = weak security, strong usability  Non Migratable Key = strong security, weak usability No TPM Protection Migratable Key Non Migratable Key Usability - Backup of Key - Backup of Key - No Backup of Key - Identity Theft Possible - Treacherous Device - Treacherous Device Attacks - Treacherous Home - Treacherous Home - Treacherous Home Bachelor Thesis SS 2009 25

  26. Performance  Performance of the Device Registration Process Bachelor Thesis SS 2009 26

  27. Performance  Performance of the Device Registration Process Device Device with TPM Create CSR 0.697s 1.169s Process CSR through HCS 1.261s 1.427s Process CSR through Device 0.555s 0.815s *Times without loading time and network transmissions Bachelor Thesis SS 2009 27

  28. Technical Limitations  Infrastructure is not completed  PCA does not exist yet (only proof of concept)  Not all TPM Manufacturers ship the EK Certificates  Other Certificates unavailable  Migration Infrastructure is incomplete Bachelor Thesis SS 2009 28

  29. Related Work: SKAE Bachelor Thesis SS 2009 29

  30. SKAE vs. this Approach  AIK signs Key directly => no migratability  No outstanding benefit, reached through SKAE  CA PCA: central entities involved in the process => overhead Bachelor Thesis SS 2009 30

  31. Conclusion  Main Goal achieved: Private Home Key is protected through a TPM  Design is dynamic and applicable also on a Device  Trade off: usability vs. security <=> migratability vs. non migratability  Trade off at users side Bachelor Thesis SS 2009 31

  32. Future Work  Infrastructure has to be completed  Exploit advantages of provable TPM protection  Trust Level leads to Access Level Bachelor Thesis SS 2009 32

  33. Questions? Bachelor Thesis SS 2009 33

  34. Literature  Thomas Müller – Trusted Computing Systeme  Trusted Computing Group – TPM Specification Part 1, Part 2, Part 3 http://www.trustedcomputinggroup.org/resources/ tpm_specification_version_12_revision_103_part_1__3/  TCG Infrastructure Workgroup – Subject Key Attestation Evidence http://www.trustedcomputinggroup.org/files/resource_files/ 876A7F79-1D09-3519-AD321B21144AE93C/ IWG_SKAE_Extension_1-00.pdf  IAIK TU Graz - Trusted Computing for the JAVA Platform http://trustedjava.sourceforge.net/  Simon Mittelberger – A Certification Service for future Home Networks based on Trusted Computing Technology Bachelor Thesis SS 2009 34

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend