TPM: Trusted Platform Module
Sumeet Bajaj sbajaj@cs.stonybrook.edu
9 Feb 2011 CSE 408
TPM: Trusted Platform Module Sumeet Bajaj sbajaj@cs.stonybrook.edu - - PowerPoint PPT Presentation
TPM: Trusted Platform Module Sumeet Bajaj sbajaj@cs.stonybrook.edu 9 Feb 2011 CSE 408 Introduction verification request verification data Verifier Platform Attestation of Remote Platform Identify specific platform Verify software
9 Feb 2011 CSE 408
Trusted Platform Module
Uses
Applications
Verifier Platform
verification data verification request
TPM deployed
platform
TPM Specification Design Structure Commands TPM Chips No TPMS China, Russia, Belarus, Kazakhstan
300 Million PCs have shipped with a chip called the Trusted Platform Module (TPM)
FIPS 140-2 Level 1 The lowest, imposes very limited requirements; loosely, all components must be "production-grade" FIPS 140-2 Level 2 Adds requirements for physical tamper-evidence and role-based authentication. FIPS 140-2 Level 3 Adds requirements for physical tamper-resistance (making it difficult for attackers to gain access to sensitive information contained in the module) and identity-based authentication, and for a physical or logical separation between the interfaces by which "critical security parameters" enter and leave the module, and its other interfaces. FIPS 140-2 Level 4 Makes the physical security requirements more stringent, and requires robustness against environmental attacks.
FIPS: Federal Information Processing Standard
Problem! Scale, collusion
160 bits
H : SHA-1
BIOS Boot Block BIOS MBR/OS Loader Operating System Application Root of Trust in Integrity Measurement
Measuring Extending PCS
Root of Trust in Integrity Reporting
generates PKA & SKA 2) {PCR} SKAIK
3) Cert{PKAIK}SKTPM {PCR}SKAIK
6) looks up #A in DB 5) verifies the signature 7) ... PKTPM & SKTPM (Endorsement key)
1) Read_PCR
Lookup PCR “ok”
PKAIK & SKAIK (Attestation Identity Key)
Problem! Does not protect user privacy EK is one-time unique per TPM AIK can be used anew for each attestation 4) Cert{PKAIK} SKTPM , {PCR}SKAIK
PKTPM & SKTPM
……..
Problem! Identify legitimate TPMs from fake
Problem! Scale, collusion
PKTPM & SKTPM (Endorsement key)
PKAIK & SKAIK (Attestation key)
Remove rogue TPM key from list
Direct : Without a TTP Anonymous : Does not reveal signer’s identity Attestation : claim from a TPM
Can tell SKAIK1 is from a TPM But not which one Can tell SKAIK2 is from a TPM But not which one Cannot tell if SKAIK1 & SKAIK12 Are from the same TPM
Commit to Derive from issuer’s name by TPM Proves that Signature on Secret Public DAA certificate
Zero knowledge proof protocol TPM proves it knows TPM Proves the exponent is related
Application : Media Player
http://www.trustedcomputinggroup.org/resources/tcg_software_stack_tss_specification
6000 PCI 4764/65 SafeXcel
Trusted by the clients Performs or aids query processing Can provide Tamper Proofing / Detection Supports Cryptographic functions (software or hardware based) Commonly used as accelerators
21
Function (OpenSSL 0.9.7f) Context IBM 4764 (per second) P4 @ 3.4 GHz (per second) RSA signature 1024 bits 848 261 2048 bits 316 – 470 43 RSA verification 1024 bits 1157 – 1242 5324 2048 bits 976-1087 1613 SHA-1 1 KB 1.42 MB 80 MB 64 KB 18.6 MB 120 + MB 1 MB 21 – 24 MB 3 DES 1 KB 1.08 MB 18 MB 64 KB 7.73 MB 17 MB 1 MB 8.56 MB 15 MB AES 128 1 KB 14+ MB 100+ MB DMA xfer end-to-end 75 – 90 MB 1+ GB Processor 233 MHz PowerPC Memory 32 MB Crypto H/W engines AES256, DES, TDES, DSS, SHA-1, MD5, RSA
Tamper resistant and responsive design, FIPS level 4 certified Limited resources Synchronous communication channel with host Hardware crypto engine
22
PKCMAN KDATA
SKOS
SKMAN
SKDEV SKCMAN
PKA : Public Key of A SKA : Private Key of A H(M) : Hash of message M
23 SIGMOD 2011 : TrustedDB
9 Feb 2011 CSE 408