1 / 24

Trusted Computing Platform Alliance

Trusted Computing Platform Alliance. David Grawrock Security Architect Desktop Architecture Labs Intel Corporation 22 August 2014. Trusted Computing Platform Alliance. Agenda. Background Attestation Specification What Is Next. Background. TCPA History. Established in spring 1999

hua
Download Presentation

Trusted Computing Platform Alliance

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Trusted Computing Platform Alliance David Grawrock Security Architect Desktop Architecture Labs Intel Corporation 22 August 2014

  2. Trusted Computing Platform Alliance Agenda • Background • Attestation • Specification • What Is Next

  3. Background TCPA History • Established in spring 1999 • Promoters are: • Compaq, IBM, Intel, HP and Microsoft • Membership over 160 companies • Web site • http://www.trustedpc.org/

  4. Background TCPA Technical Challenge To maintain the privacy of the platform owner while providing a ubiquitous interoperable mechanism to validate the identity and integrity of a computing platform TCPA provides the base for reporting identity and integrity

  5. On the Internet no one knows you are a dog On the Internet no one knows if you have a proper configuration Attestation Are You A Dog?

  6. “To affirm to be true, correct or genuine”1 Cryptographic proof of information regarding the platform Information that could be attested to includes: HW on platform BIOS Configuration options And much more Attestation Attestation Definition 1 American Heritage Dictionary

  7. Attestation Attestation Promise • TCPA never lies about the state of measured information • This requires • Accurate measurement • Protected storage • Provable reporting of measurement TCPA defines an attestation device

  8. Main specification defines Trusted Platform Module (TPM) Definition is platform neutral All command to TPM are defined PC Specific specification defines how to implement on a PC platform These specs are available on the web site TPM Specification Specifications Available

  9. Specification TPM Components TPM • Generate and use RSA keys • Provide long-term protected storage of RSA root key • Store measurements in PCR • Use anonymous identities to report PCR status Non-Volatile Storage Key Generation Anonymous Identities RNG PCR RSA Opt-In TPM definition is complete

  10. Trusted Computing Platform Alliance Summary • TCPA provides the base for reporting identity and integrity • TCPA defines an attestation device • TPM definition is complete

  11. Trusted Computing Platform Alliance What Next? • Design platforms and applications for TPM use • Extend the trust and integrity of platforms

  12. Trusted Computing Platform Alliance Questions?

  13. Trusted Computing Platform Alliance Backup Material

  14. The storage is to hold secure the endorsement key (EK) Each TPM has a unique EK The endorsement key must be protected from both exposure and improper use In addition to the EK there are some flags that are kept in non-volatile storage TPM Non-Volatile Storage Key Generation Anonymous Identities RNG PCR RSA Opt-In Functionality Non-volatile Storage

  15. The TPM can generate RSA keys Default size 2048 bits Other algorithms possible The keys can be used for signing / verification or encryption / decryption Use of key must be specified at creation time There is no speed requirement on how long or how short a time generation will take Functionality Key Generation TPM Non-Volatile Storage Key Generation Anonymous Identities RNG PCR RSA Opt-In

  16. All operations attesting to the TPM use an anonymous identity rather than the EK An anonymous identity certifies that the key came from A TPM not WHICH TPM Devil is in the details see the main spec Functionality Anonymous Identities TPM Non-Volatile Storage Key Generation Anonymous Identities RNG PCR RSA Opt-In

  17. All TPM’s must have a RNG Implementation is manufacturer specific The specification asks for, but does not require, FIPS evaluation of the RNG The RNG output is used both internally by the TPM and is offered to outside consumers of randomness Functionality Random Number Generator TPM Non-Volatile Storage Key Generation Anonymous Identities RNG PCR RSA Opt-In

  18. The TPM has a minimum of 16 Platform Configuration Registers (PCR) The PCR registers uses the EXTEND operation to store measurements regarding the platform PCR value = SHA(new value, old value) Functionality PCR Registers TPM Non-Volatile Storage Key Generation Anonymous Identities RNG PCR RSA Opt-In

  19. The TPM can encrypt and decrypt using RSA keys The use of keys is segregated into signing or encryption uses The TPM must handle RSA keys of 2048 bits in size Functionality RSA Engine TPM Non-Volatile Storage Key Generation Anonymous Identities RNG PCR RSA Opt-In

  20. The TPM has mechanisms that make the use of the TPM a complete Opt-In system The Opt-in selections are maintained across power cycles and the TPM can be deactivated Functionality Opt-In TPM Non-Volatile Storage Key Generation Anonymous Identities RNG PCR RSA Opt-In

  21. Requests TPS TPM Version 1.0TCPA Functional Layout • TPS – Trusted Platform Subsystem • BIOS • Drivers • ALL operations come through TPS • TPM – Trusted Platform Module • Hardware • Microcode • Protected functionality • Shielded locations

  22. Application OS / Driver OS Present TPS Security API Ring 0 Library Middleware OS Present Ring 3 Library TCPA Security Driver BIOS OS Absent OS Absent TPS Security API OS Absent Library Hard-ware TPM Hardware and Microcode Version 1.0TCPA System Architecture

  23. Application Application Application Application Applications CDSA Existing Infrastructure CSSM CAPI Other API Modified Infrastructure CSP DL CSP CSP TPS TPS Interface TPM TPM Interface Version 1.0TCPA Software Architecture

  24. CPU System Memory MCH System Flash ICH LPC TPM Version 1.0Possible TPM Placement • TPM connecting on LPC bus • TPM has low transaction volume so speed of bus not issue • Connection of TPM is vendor specific and not specified in specification Specification provides robust set of features

More Related