Microsoft s next generation secure computing base formerly palladium
Download
1 / 24

Powerpoint slides - PowerPoint PPT Presentation


  • 266 Views
  • Updated On :

Microsoft’s Next-Generation Secure Computing Base, formerly Palladium Kit Colbert Student Consultant Representing Microsoft [email protected] What is Palladium? A set of hardware and software extensions to make the PC more trustworthy. Today’s apps will still run just fine.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Powerpoint slides' - andrew


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Microsoft s next generation secure computing base formerly palladium l.jpg

Microsoft’sNext-Generation Secure Computing Base,formerly Palladium

Kit ColbertStudent Consultant Representing [email protected]


What is palladium l.jpg
What is Palladium?

  • A set of hardware and software extensions to make the PC more trustworthy.

  • Today’s apps will still run just fine.

  • You can disable Palladium extensions if you choose.

  • What exactly is trustworthy computing?

  • Good question…


Trustworthy computing l.jpg
Trustworthy Computing

  • Trustworthy: worthy of confidence.

  • Examples:

    • Credit card numbers that can’t be stolen.

    • Personal diary that can only be written and viewed by you or people you choose.

    • Someone is who she says she is.

  • There are currently ad-hoc solutions for some of these concerns, Palladium seeks to solve them all.


Who to trust l.jpg
Who To Trust?

  • Applications?

  • Operating systems can programmatically subvert applications.

  • Operating System?

  • Hardware can programmatically subvert operating systems.

  • Hardware?

  • Humans can subvert hardware, but not programmatically.

  • So we have to start off trusting the hardware.


Chain of trust l.jpg
Chain of Trust

  • We start off trusting the hardware and build up, thus creating a chain of trust.

Applications

Operating System

Hardware


Palladium s goals l.jpg
Palladium’s Goals

  • Usher in a new era of trustworthy computing by enabling the PC to:

    • Perform trusted operations

    • Span multiple computers with this trust

    • Create dynamic trust policies

    • Allow anyone to authenticate these policies


How palladium will do it l.jpg
How Palladium Will Do It

  • Specifically, Palladium will add four new security features that increase the trustworthiness of the machine:

    • Protected memory

    • Attestation

    • Sealed storage

    • Secure input and output

  • It primarily does this through cryptographic keys and algorithms.


Hardware extensions l.jpg
Hardware Extensions

  • Security Support Component (SSC)

  • Secure communication channels for:

    • I/O

    • Graphics

    • Network

    • Storage

    • Chipsets

  • CPU op-codes, registers, interrupts, and status bits


Software extensions l.jpg
Software Extensions

  • Nexus

    • (the kernel)

    • shared source

  • Trusted agents

    • (the applications)

  • So what is this, a whole other operating system??

  • Well, sort of…


The new view l.jpg
The New View

  • Two parallel operating systems?

  • Not quite, the trusted kernel still relies on the untrusted kernel for most of its functionality.

User Mode

Trusted

User Mode

Kernel Mode

Trusted

Kernel Mode


Ssc nexus interaction l.jpg
SSC/Nexus Interaction

  • Sealed storage:

    • SSC’s symmetric key, call it ‘s’

    • SSC hash of running Nexus kernel, call it ‘h’

    • Arbitrary data pointed to by pointer ‘p’

    • SSC implements two operations:

      • c = SEAL(p)

      • p = UNSEAL(c)

    • Example implementation:

      • SEAL: aes_encrypt(s+h, p)

      • UNSEAL: aes_decrypt(s+h, p)

  • If either SSC or Nexus changes, can’t retrieve data!


Bringing it all together l.jpg
Bringing It All Together

  • Closed sphere of trust:


Slide13 l.jpg
TCPA

  • Trusted Computing Platform Alliance

    • Group of companies (about 200)

    • Biggest players:

      • Microsoft

      • Intel

      • Compaq

      • HP

      • IBM

  • Same goal as Palladium: trustworthiness


All about the hardware l.jpg
All About the Hardware

  • TCPA specification only for hardware

    • It’s operating system agnostic

  • Complete TCPA 1.1b spec online

  • One implementation of it in production machines (one version of IBM Thinkpad)

  • Palladium uses some of the TCPA spec


How palladium will affect you l.jpg
How Palladium Will Affect You

  • A Palladium PC will still run non-trusted apps

    • So everything you have now will still work

  • Palladium is opt-in

    • You have to explicitly choose to use it

  • Signed binaries means less chances of a trojan or virus inserted into commonly used programs


Your information is secure l.jpg
Your Information is Secure

  • All your personal information is stored on your home machine, not on some company’s server.

  • You control precisely who sees what and what they can do with it.

  • No more doctor’s new patient forms, no more filling out credit card apps, etc.


Digital rights management l.jpg
Digital Rights Management

  • Probably the biggest issue with Palladium

  • Palladium will enable the media companies to protect their content

  • Which raises some questions:

    • So no more fair use?

    • Can I still pirate?

  • Fair use: probably not for the short term

  • Piracy: you can still do it on the non-trusted side


Open source and palladium l.jpg
Open Source and Palladium

  • Will operating systems like Linux still run on a Palladium PC?

    • Definitely.

  • Not only will Linux still run, but it could in theory be modified to have a Nexus

    • Thus it could run trusted apps


No user authentication l.jpg
No User Authentication

  • User authentication is done through Windows

    • Ie, usual Windows logon

  • User is tied to the machine and its keys

    • Everything encrypted with combination of machine’s SSC and Nexus keys

    • Switching machines could be tedious


3 phase deployment plan l.jpg
3-Phase Deployment Plan

  • Deploy in corporations

    • Use in internal networks

    • Make sure sensitive data isn’t leaked

  • Get major media companies involved

    • Create trusted content and applications

  • End users/consumers

    • Use the trusted apps and content

    • Distribute personal information


Conclusion l.jpg
Conclusion

  • Palladium is a platform

    • Enables ISVs to write trusted apps easily.

  • First version in future version of Windows

    • Sometime around 2005 or 2006

  • Will it work?

    • Who knows. Microsoft hopes so.

  • Do you want it to work?

    • There are good and bad outcomes of it.

    • It’s a personal decision.


Palladium links l.jpg
Palladium Links

  • Microsoft Palladium: A Business Overviewhttp://www.microsoft.com/PressPass/features/2002/jul02/0724palladiumwp.asp

  • Microsoft NGSCB Technical FAQhttp://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/news/NGSCB.asp

  • Palladium Detailshttp://www.activewin.com/articles/2002/pd.shtml

  • Microsoft Meeting on Palladiumhttp://vitanuova.loyalty.org/2002-07-03.html

  • EPIC’s Palladium Coveragehttp://www.epic.org/privacy/consumer/microsoft/palladium.html

  • Inside Microsoft’s Secure OS Project Palladiumhttp://www.extremetech.com/article2/0,3973,837726,00.asp

  • MIT Palladium Presentationhttp://www.cryptome.org/palladium-mit.htm


More palladium links l.jpg
More Palladium Links

  • Interview with Palladium’s Mario Juarezhttp://www.digitalidworld.com/modules.php?op=modload&name=News&file=article&sid=74&mode=&order=0

  • Q&A: Palladium Initiativehttp://www.microsoft.com/presspass/Features/2002/Jul02/07-01palladium.asp

  • TCPA / Palladium FAQhttp://www.cl.cam.ac.uk/%7Erja14/tcpa-faq.html

  • TCPA and Palladium: Sony Insidehttp://www.kuro5hin.org/story/2002/7/9/17842/90350

  • TCPA and Palladium Technical Analysishttp://wintermute.homelinux.org/miscelanea/TCPA%20Security.txt

  • Palladium and the TCPAhttp://www.counterpane.com/crypto-gram-0208.html

  • TCPA Homepagehttp://www.trustedpc.org



ad