SlideShare a Scribd company logo
TRUSTED PLATFORM MODULE
INTRODUCTION
• The Trusted Platform Module (TPM) is an international
standard for a secure crypto-processor.
• The TPM technical specification was written by a computer
industry consortium called the Trusted Computing Group
(TCG).
• The International Organization for Standardization (ISO) and
the International Electro-technical Commission (IEC)
standardized the specification as ISO/IEC 11889 in 2009.
2 of 36
ABBREVIATIONS
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•

TPM – Trusted Platform Module
TCG – Trusted Computing Group
TCB - Trusted Computing Base
BIOS – Basic Input-Output System
EK – Endorsement Key
SRK – Storage Root Key
PCR – Platform Configuration Register
AIK – Attestation Identity Key
ROT – Root of Trust
CRTM – Core Root of Trust
RTM – Root of Trust for Measurement
RTR – Root of Trust for Reporting
RTS – Root of Trust for Storage
MBR – Master Boot Record
GRUB – Grand Unified Boot Loader
DRM – Digital Rights Management

3 of 36
TRUSTED COMPUTING GROUP
• The Trusted Computing Group (2003), successor to the Trusted
Computing Platform Alliance (TCPA)
• An initiative started by AMD, Cisco, Hewlett-Packard, IBM, Intel,
Microsoft and Wave Systems Corp.
• TCG is a non-profit organization formed to develop, define, and promote
open standards for hardware-enabled trusted computing and security
technologies, including hardware building blocks and software interfaces
across multiple platforms
• Promoters + Contributors + Adopters = 108
4 of 36
TRUSTED COMPUTING BASE
Trusted Computing Base
Trusted Computing Environment
Applications

5 of 36
TRUSTED COMPUTING
• The computer will consistently behave in expected ways, and those
behaviors will be enforced by computer hardware and software
• Enforcing this behavior is achieved by loading the hardware with a unique
encryption key inaccessible to the rest of the system
• TC is controversial as the hardware is not only secured for its owner, but
also secured against its owner

6 of 36
FUNDAMENTAL TRUSTED COMPUTING
FUNCTIONALITY
• A mechanism is required to record (measure) what software
is/was running
•
•
•
•

Requires to monitor the boot process
Needs an anchor to start the measurement from a Root of Trust
Nobody should be able to modify or forge these measurements
Some shielded location for the measurements is required

7 of 36
FUNDAMENTAL TRUSTED COMPUTING
FUNCTIONALITY
• Now you know that your platform is in a defined state
• Why should someone else believe this claim?
• A mechanism to securely report the measurements to a 3rd party is
required
• Secure storage
• Allow access to data only if system is in a known state

• Cost efficient implementation and production

8 of 36
TPM SPECIFICATION
Design Principles

TPM Structures
TPM Specifications
for 1.2

TPM Commands

Compliance

9 of 36
TCG Doc. ROADMAP

10 of 36
TPM
• The TPM is a platform component
• NOT a platform all by itself
• TPM becomes a permanent component of the platform
• The TPM is NOT an active component, always a responder to a request and
never initiates an interrupt or other such operation
• TPM cannot alter execution flow of system (e.g. booting, execution of
applications)

11 of 36
TPM: CHANGES TO PC
• Extra hardware
• TPM
• Single 33 MHz clock
• Software changes
• BIOS
• OS & Apps

12 of 36
TPM COMPONENTS

13 of 36
PLATFORM CONFIGURATION REGISTERS
• There are at least 16 PCRs in a TPM.
• They store platform configuration measurements.
• These measurements are normally hash values (SHA-1) of entities
(applications) running on the platform.
• PCRs can not be written directly; data is stored by a process called
extending the PCR.
• PCR = SHA-1(PCR + measurement)
• PCR extends are not commutative
• PCRs initialized to default value (e.g. 0) at boot time
• After boot, PCRs contain hash chain of booted software
14 of 36
INTEGRITY MEASUREMENT WITH TPM
• A measures entity B (could be executable or other files ...). Result is
a B's "fingerprint".
• This fingerprint is stored in a Stored Measurement Log (SML)
which resides in the hard drive (outside, and not protected by a
TPM).
• A then inserts B's fingerprint into a PCR (via the PCR's extend
operation).
• Control is passed to B.
15 of 36
TRUSTED BOOT

16 of 36
ROOTS OF TRUST
• Root of Trust is a hardware or software mechanism that one implicitly trusts
• Root of Trust for Measurement (RTM)
• Uses Platform Configuration Registers (PCR) to record the state of a system
• Static entity like the PC BIOS

• Root of Trust for Reporting (RTR)
• Entity trusted to report information accurately and correctly
• Uses PCR and RSA signatures to report the platform state to external parties in an
unforgettable way

• Root of Trust for Storage (RTS)
• Entity trusted to store information without interference leakage
• Uses PCR and RSA encryption to protect data and ensure that data can only be accessed if
platform is in a known state

17 of 36
ROOT OF TRUST FOR MEASUREMENT
• Involved steps:
• Measure (compute the hash value of) the next entity: e.g. the
BIOS measures the OS loader
• The measurement is extended into one of the TPM PCR
• Control is passed to the measured entity
• This process is continued for all components of a system up to
user level applications
• Measurements change with system updates and patches

18 of 36
ROOT OF TRUST FOR REPORTING
• Endorsement Key (EK) forms the RTR
• Private part never leaves the TPM (only exists in shielded location)
• EK is unique for every TPM and therefore uniquely identifies a
TPM
• The EK is backed by an EK certificate typically issued by the TPM
manufacturer
• The EK certificate guarantees that the key actually is an EK and is
protected by a genuine TPM
19 of 36
ROOT OF TRUST FOR STORAGE
• Two approaches
• Without using PCR: bind/unbind
• With using PCR: seal/unseal

• Binding
• Happens outside of the TPM
• Encrypt data with the public part of a TPM key
• Only the TPM that the key pair belongs to can decrypt the data and private key can
only be used inside the TPM
• Binding to a specific TPM, use a non-migratable binding key (migratable keys can
also be used)

• Unbinding
• Decryption of bound data inside the TPM using the private key
20 of 36
TPM KEYS
• Storage Root Key (SRK)
•
•
•
•

2048 bit RSA key
Is top level element of TPM key hierarchy
Created during take ownership
Non-migratable, store inside the chip, can be removed

• Storage Keys
• RSA keys used to wrap (encrypt) other elements in the TPM key hierarchy
• Created during user initialization

• Signature Keys
• RSA keys used for signing operations
• Must be a leaf in the TPM key hierarchy
21 of 36
KEY CONCEPTS
• Endorsement key
• Secure input and output
• Memory curtaining / protected execution
• Sealed storage
• Remote attestation

22 of 36
ENDORSEMENT KEY
• The endorsement key is a 2048-bit RSA public and private key
pair
• Created randomly on the chip at manufacture time
• Non-migratable, store inside the chip, cannot be removed
• It is never used for encryption or signing

23 of 36
SECURE INPUT AND OUTPUT
• Secure I/O provides a secure hardware path from the keyboard
to an application
• From the application back to the screen.
• No other software running on the same PC will be able to
determine what the user typed, or how the application
responded.

24 of 36
MEMORY CURTAINING
• Memory curtaining extends common memory protection
techniques to provide full isolation of sensitive areas of
memory
• Even the operating system does not have full access to
curtained memory
• The exact implementation details are vendor specific

25 of 36
SEALED STORAGE
• Sealed storage protects private information by binding it to
platform configuration information including the software and
hardware being used
• Data can be released only to a particular combination of
software and hardware
• Embedding PCR values in blob ensures that only
certain apps can decrypt data
• Messing with MBR or OS kernel will change PCR values
26 of 36
SEALED STORAGE
• Encrypt data using RSA key on TPM
• TPM_Seal
•
•
•
•

(some) Arguments:
keyhandle: which TPM key to encrypt with
KeyAuth: Password for using key `keyhandle’
PcrValues: PCRs to embed in encrypted blob
data block: at most 256 bytes (2048 bits)
•

Used to encrypt symmetric key (e.g. AES)

• Returns encrypted blob.

• Blob can only be decrypted with TPM_Unseal when:
• PCR-reg-vals = PCR-vals in blob.

• TPM_Unseal will fail otherwise
27 of 36
REMOTE ATTESTATION
• Remote attestation allows changes to the user's computer to be
detected by authorized parties
• Good applications:
• Bank allows money transfer only if customer’s machine runs “up-to-date”
OS patches.
• Enterprise allows laptop to connect to its network only if laptop runs
“authorized” software
• Quake players can join a Quake network only if their Quake client is
unmodified.

• DRM:

• Music Stores sell content for authorized players only.
28 of 36
REMOTE ATTESTATION- HOW IT WORKS
• Recall: EK private key on TPM.
• Cert for EK public-key issued by TPM vendor.

• Step 1: Create Attestation Identity Key (AIK)
• AIK Private key known only to TPM
• AIK public cert issued only if EK cert is valid

29 of 36
REMOTE ATTESTATION- HOW IT WORKS
• Step 2: sign PCR values (after boot)
• Call TPM_Quote (some) Arguments:
• keyhandle: which AIK key to sign with
• KeyAuth: Password for using key `keyhandle’

• PCR List: Which PCRs to sign.
• Challenge: 20-byte challenge from remote server
• Prevents replay of old signatures.

• Userdata: additional data to include in sig.

• Returns signed data and signature.
30 of 36
MISCONCEPTIONS CLARIFIED
• The TPM does not measure, monitor or control anything
• The TPM is a passive device in the system
• The TPM has no way of knowing what was measured
• Measurements are made by host software and sent to the TPM

• TPM does not perform bulk encryption
• (e.g. File and Folder encryption or Full Disk encryption)

• Digital Right Management (DRM) is not a goal of TCG specifications
• All technical aspects of DRM are not inherent in the TPM

• TPM can work with any operating systems or application software
• The specification is open and the API is defined, no TCG secrets
31 of 36
BENEFITS
•
•
•
•
•
•
•

Enhance confidence in platform
Proof that a platform is a Trusted Platform
Binding of data to a particular platform
Sealing data to a trusted system state/configuration
Owner privacy and control
Secure boot
Low cost exportable technology
32 of 36
CRITICISM
•
•
•
•
•
•

Digital rights management
Users unable to modify software
Users have no control over data
Users unable to exercise legal rights
Users vulnerable to vendor withdrawal of service
Users unable to override

33 of 36
STANDARDIZATION
• JTC1, a joint committee of the International Organization for
Standardization, or ISO, and IEC, the International Electro-technical
Commission, has accepted and published the Trusted Computing
Group Trusted Platform Module specification Version 1.2 as
ISO/IEC standard 11889.
• Abstract
• ISO/IEC 11889 defines the Trusted Platform Module (TPM), a device that enables
trust in computing platforms in general. ISO/IEC 11889-1:2009 is an overview of
the TPM. It describes the TPM and how it fits into the trusted platform. ISO/IEC
11889-1:2009 describes trusted platform concepts such as the trust boundary,
transitive trust, integrity measurement, and integrity reporting.
34 of 36
35 of 36
THANK YOU

36 of 36

More Related Content

What's hot

8 Access Control
8 Access Control8 Access Control
8 Access Control
Alfred Ouyang
 
Security in an embedded system
Security in an embedded system Security in an embedded system
Security in an embedded system
UrmilasSrinivasan
 
Introduction to Optee (26 may 2016)
Introduction to Optee (26 may 2016)Introduction to Optee (26 may 2016)
Introduction to Optee (26 may 2016)
Yannick Gicquel
 
TEE - kernel support is now upstream. What this means for open source security
TEE - kernel support is now upstream. What this means for open source securityTEE - kernel support is now upstream. What this means for open source security
TEE - kernel support is now upstream. What this means for open source security
Linaro
 
Secure Boot on ARM systems – Building a complete Chain of Trust upon existing...
Secure Boot on ARM systems – Building a complete Chain of Trust upon existing...Secure Boot on ARM systems – Building a complete Chain of Trust upon existing...
Secure Boot on ARM systems – Building a complete Chain of Trust upon existing...
Linaro
 
introduction to Embedded System Security
introduction to Embedded System Securityintroduction to Embedded System Security
introduction to Embedded System Security
Adel Barkam
 
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEEBKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
Linaro
 
LCU14-103: How to create and run Trusted Applications on OP-TEE
LCU14-103: How to create and run Trusted Applications on OP-TEELCU14-103: How to create and run Trusted Applications on OP-TEE
LCU14-103: How to create and run Trusted Applications on OP-TEE
Linaro
 
Trusted firmware deep_dive_v1.0_
Trusted firmware deep_dive_v1.0_Trusted firmware deep_dive_v1.0_
Trusted firmware deep_dive_v1.0_
Linaro
 
Insights into the performance and configuration of TCP in Automotive Ethernet...
Insights into the performance and configuration of TCP in Automotive Ethernet...Insights into the performance and configuration of TCP in Automotive Ethernet...
Insights into the performance and configuration of TCP in Automotive Ethernet...
RealTime-at-Work (RTaW)
 
Iptables in linux
Iptables in linuxIptables in linux
Iptables in linux
Mandeep Singh
 
Intro to Embedded OS, RTOS and Communication Protocols
Intro to Embedded OS, RTOS and Communication ProtocolsIntro to Embedded OS, RTOS and Communication Protocols
Intro to Embedded OS, RTOS and Communication Protocols
Emertxe Information Technologies Pvt Ltd
 
Property-Based TPM Virtualization
Property-Based TPM VirtualizationProperty-Based TPM Virtualization
Property-Based TPM Virtualization
Marcel Winandy
 
Key management
Key managementKey management
Key management
Sujata Regoti
 
Memory forensics.pptx
Memory forensics.pptxMemory forensics.pptx
Memory forensics.pptx
9905234521
 
Social Engineering.pdf
Social Engineering.pdfSocial Engineering.pdf
Social Engineering.pdf
MeshalALshammari12
 
NMAP
NMAPNMAP
Linux kernel modules
Linux kernel modulesLinux kernel modules
Linux kernel modules
Eddy Reyes
 
Introduction to filesystems and computer forensics
Introduction to filesystems and computer forensicsIntroduction to filesystems and computer forensics
Introduction to filesystems and computer forensics
Mayank Chaudhari
 

What's hot (20)

8 Access Control
8 Access Control8 Access Control
8 Access Control
 
Security in an embedded system
Security in an embedded system Security in an embedded system
Security in an embedded system
 
Introduction to Optee (26 may 2016)
Introduction to Optee (26 may 2016)Introduction to Optee (26 may 2016)
Introduction to Optee (26 may 2016)
 
TEE - kernel support is now upstream. What this means for open source security
TEE - kernel support is now upstream. What this means for open source securityTEE - kernel support is now upstream. What this means for open source security
TEE - kernel support is now upstream. What this means for open source security
 
Secure Boot on ARM systems – Building a complete Chain of Trust upon existing...
Secure Boot on ARM systems – Building a complete Chain of Trust upon existing...Secure Boot on ARM systems – Building a complete Chain of Trust upon existing...
Secure Boot on ARM systems – Building a complete Chain of Trust upon existing...
 
introduction to Embedded System Security
introduction to Embedded System Securityintroduction to Embedded System Security
introduction to Embedded System Security
 
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEEBKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
 
LCU14-103: How to create and run Trusted Applications on OP-TEE
LCU14-103: How to create and run Trusted Applications on OP-TEELCU14-103: How to create and run Trusted Applications on OP-TEE
LCU14-103: How to create and run Trusted Applications on OP-TEE
 
Trusted firmware deep_dive_v1.0_
Trusted firmware deep_dive_v1.0_Trusted firmware deep_dive_v1.0_
Trusted firmware deep_dive_v1.0_
 
Insights into the performance and configuration of TCP in Automotive Ethernet...
Insights into the performance and configuration of TCP in Automotive Ethernet...Insights into the performance and configuration of TCP in Automotive Ethernet...
Insights into the performance and configuration of TCP in Automotive Ethernet...
 
Iptables in linux
Iptables in linuxIptables in linux
Iptables in linux
 
Intro to Embedded OS, RTOS and Communication Protocols
Intro to Embedded OS, RTOS and Communication ProtocolsIntro to Embedded OS, RTOS and Communication Protocols
Intro to Embedded OS, RTOS and Communication Protocols
 
Property-Based TPM Virtualization
Property-Based TPM VirtualizationProperty-Based TPM Virtualization
Property-Based TPM Virtualization
 
Key management
Key managementKey management
Key management
 
Memory forensics.pptx
Memory forensics.pptxMemory forensics.pptx
Memory forensics.pptx
 
Social Engineering.pdf
Social Engineering.pdfSocial Engineering.pdf
Social Engineering.pdf
 
Linux forensics
Linux forensicsLinux forensics
Linux forensics
 
NMAP
NMAPNMAP
NMAP
 
Linux kernel modules
Linux kernel modulesLinux kernel modules
Linux kernel modules
 
Introduction to filesystems and computer forensics
Introduction to filesystems and computer forensicsIntroduction to filesystems and computer forensics
Introduction to filesystems and computer forensics
 

Viewers also liked

Trusted Computing Base
Trusted Computing BaseTrusted Computing Base
Trusted Computing Base
Vasily Sartakov
 
Presentation on Total Productive Maintenance
Presentation on Total Productive MaintenancePresentation on Total Productive Maintenance
Presentation on Total Productive Maintenance
Mahendra K SHUKLA
 
Txt Introduction
Txt IntroductionTxt Introduction
Txt Introduction
Logic Solutions, Inc.
 
Mantenimiento productivo total
Mantenimiento productivo totalMantenimiento productivo total
Mantenimiento productivo total
Jesus Sanchez
 
Mantenimiento Preventivo Total TPM
Mantenimiento Preventivo Total TPMMantenimiento Preventivo Total TPM
Mantenimiento Preventivo Total TPM
Juan Carlos Fernández
 
Mantenimiento Productivo Total
Mantenimiento Productivo TotalMantenimiento Productivo Total
Mantenimiento Productivo Total
Jesus Sanchez
 
Mantenimiento Productivo Total
Mantenimiento Productivo TotalMantenimiento Productivo Total
Mantenimiento Productivo TotalPriincez Jnez
 
Mantenimiento Productivo Total Tpm
Mantenimiento Productivo Total TpmMantenimiento Productivo Total Tpm
Mantenimiento Productivo Total Tpm
gomezsantos
 
Trusted computing introduction and technical overview
Trusted computing introduction and technical overviewTrusted computing introduction and technical overview
Trusted computing introduction and technical overview
Sajid Marwat
 
Audit Principles
Audit PrinciplesAudit Principles
Audit Principles
k33a
 
NeoQUEST: Tpm.txt.на что способно заморское железо
NeoQUEST: Tpm.txt.на что способно заморское железоNeoQUEST: Tpm.txt.на что способно заморское железо
NeoQUEST: Tpm.txt.на что способно заморское железо
Neo_QUEST
 
Cisco ASA CX - новый прикладной МСЭ
Cisco ASA CX - новый прикладной МСЭCisco ASA CX - новый прикладной МСЭ
Cisco ASA CX - новый прикладной МСЭCisco Russia
 
Технологии Интел по обеспечению безопасности корпоративных пользователей.
 Технологии Интел по обеспечению безопасности корпоративных пользователей. Технологии Интел по обеспечению безопасности корпоративных пользователей.
Технологии Интел по обеспечению безопасности корпоративных пользователей.Cisco Russia
 
NEOS IoT Security Platform : System-on-module with WiFi and TPM (Trusted Plat...
NEOS IoT Security Platform : System-on-module with WiFi and TPM (Trusted Plat...NEOS IoT Security Platform : System-on-module with WiFi and TPM (Trusted Plat...
NEOS IoT Security Platform : System-on-module with WiFi and TPM (Trusted Plat...
Byeongseok Yu
 
Resent intel microprocessor
Resent intel microprocessorResent intel microprocessor
Resent intel microprocessor
Kartik Kalpande Patil
 
Intel corporation 1992
Intel corporation 1992Intel corporation 1992
Intel corporation 1992Anish Sengupta
 
Anatomy of a Deal: Avid Radiopharmaceuticals
Anatomy of a Deal: Avid RadiopharmaceuticalsAnatomy of a Deal: Avid Radiopharmaceuticals
Anatomy of a Deal: Avid Radiopharmaceuticals
Safeguard Scientifics
 

Viewers also liked (20)

Trusted Computing Base
Trusted Computing BaseTrusted Computing Base
Trusted Computing Base
 
Tpm
TpmTpm
Tpm
 
Presentation on Total Productive Maintenance
Presentation on Total Productive MaintenancePresentation on Total Productive Maintenance
Presentation on Total Productive Maintenance
 
Txt Introduction
Txt IntroductionTxt Introduction
Txt Introduction
 
Mantenimiento productivo total
Mantenimiento productivo totalMantenimiento productivo total
Mantenimiento productivo total
 
TPM
TPMTPM
TPM
 
Mantenimiento Preventivo Total TPM
Mantenimiento Preventivo Total TPMMantenimiento Preventivo Total TPM
Mantenimiento Preventivo Total TPM
 
Mantenimiento Productivo Total
Mantenimiento Productivo TotalMantenimiento Productivo Total
Mantenimiento Productivo Total
 
Mantenimiento Productivo Total
Mantenimiento Productivo TotalMantenimiento Productivo Total
Mantenimiento Productivo Total
 
Mantenimiento Productivo Total Tpm
Mantenimiento Productivo Total TpmMantenimiento Productivo Total Tpm
Mantenimiento Productivo Total Tpm
 
Trusted computing introduction and technical overview
Trusted computing introduction and technical overviewTrusted computing introduction and technical overview
Trusted computing introduction and technical overview
 
Audit Principles
Audit PrinciplesAudit Principles
Audit Principles
 
NeoQUEST: Tpm.txt.на что способно заморское железо
NeoQUEST: Tpm.txt.на что способно заморское железоNeoQUEST: Tpm.txt.на что способно заморское железо
NeoQUEST: Tpm.txt.на что способно заморское железо
 
Cisco ASA CX - новый прикладной МСЭ
Cisco ASA CX - новый прикладной МСЭCisco ASA CX - новый прикладной МСЭ
Cisco ASA CX - новый прикладной МСЭ
 
Fedoseev Sofs
Fedoseev SofsFedoseev Sofs
Fedoseev Sofs
 
Технологии Интел по обеспечению безопасности корпоративных пользователей.
 Технологии Интел по обеспечению безопасности корпоративных пользователей. Технологии Интел по обеспечению безопасности корпоративных пользователей.
Технологии Интел по обеспечению безопасности корпоративных пользователей.
 
NEOS IoT Security Platform : System-on-module with WiFi and TPM (Trusted Plat...
NEOS IoT Security Platform : System-on-module with WiFi and TPM (Trusted Plat...NEOS IoT Security Platform : System-on-module with WiFi and TPM (Trusted Plat...
NEOS IoT Security Platform : System-on-module with WiFi and TPM (Trusted Plat...
 
Resent intel microprocessor
Resent intel microprocessorResent intel microprocessor
Resent intel microprocessor
 
Intel corporation 1992
Intel corporation 1992Intel corporation 1992
Intel corporation 1992
 
Anatomy of a Deal: Avid Radiopharmaceuticals
Anatomy of a Deal: Avid RadiopharmaceuticalsAnatomy of a Deal: Avid Radiopharmaceuticals
Anatomy of a Deal: Avid Radiopharmaceuticals
 

Similar to Trusted Platform Module (TPM)

Trusted Computing security _platform.ppt
Trusted Computing security _platform.pptTrusted Computing security _platform.ppt
Trusted Computing security _platform.ppt
naghamallella
 
trusted computing platform alliancee.ppt
trusted computing platform alliancee.ppttrusted computing platform alliancee.ppt
trusted computing platform alliancee.ppt
naghamallella
 
Track 5 session 3 - st dev con 2016 - mechanisms for trusted code execution...
Track 5   session 3 - st dev con 2016 - mechanisms for trusted code execution...Track 5   session 3 - st dev con 2016 - mechanisms for trusted code execution...
Track 5 session 3 - st dev con 2016 - mechanisms for trusted code execution...
ST_World
 
CSF18 - BitLocker Deep Dive - Sami Laiho
CSF18 - BitLocker Deep Dive - Sami LaihoCSF18 - BitLocker Deep Dive - Sami Laiho
CSF18 - BitLocker Deep Dive - Sami Laiho
NCCOMMS
 
TC and TPM.ppt
TC and TPM.pptTC and TPM.ppt
TC and TPM.ppt
yhaxpsos
 
Hardware_root_trust_x86.pptx
Hardware_root_trust_x86.pptxHardware_root_trust_x86.pptx
Hardware_root_trust_x86.pptx
Atul Vaish
 
CSF18 - The Night is Dark and Full of Hackers - Sami Laiho
CSF18 - The Night is Dark and Full of Hackers - Sami LaihoCSF18 - The Night is Dark and Full of Hackers - Sami Laiho
CSF18 - The Night is Dark and Full of Hackers - Sami Laiho
NCCOMMS
 
Managing bitlocker with MBAM
Managing bitlocker with MBAMManaging bitlocker with MBAM
Managing bitlocker with MBAM
Olav Tvedt
 
Windows 7 professional Vs Windows 7 enterprise
Windows 7 professional Vs Windows 7 enterpriseWindows 7 professional Vs Windows 7 enterprise
Windows 7 professional Vs Windows 7 enterprise247infotech
 
Embedded systems
Embedded systemsEmbedded systems
Embedded systems
Manju Nathan
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
Overkill Security
 
Design of control unit.pptx
Design of control unit.pptxDesign of control unit.pptx
Design of control unit.pptx
Shubham014
 
Reconfigurable trust forembeddedcomputingplatforms
Reconfigurable trust forembeddedcomputingplatformsReconfigurable trust forembeddedcomputingplatforms
Reconfigurable trust forembeddedcomputingplatforms
Abdullah Deeb
 
Thesis presentation
Thesis presentationThesis presentation
Thesis presentationCHIACHE lee
 
CSF18 - GDPR - Sami Laiho
CSF18 - GDPR - Sami LaihoCSF18 - GDPR - Sami Laiho
CSF18 - GDPR - Sami Laiho
NCCOMMS
 
HKG18-223 - Trusted FirmwareM: Trusted boot
HKG18-223 - Trusted FirmwareM: Trusted bootHKG18-223 - Trusted FirmwareM: Trusted boot
HKG18-223 - Trusted FirmwareM: Trusted boot
Linaro
 
CONFidence 2014: Yaniv Miron: ATMs – We kick their ass
CONFidence 2014: Yaniv Miron: ATMs – We kick their assCONFidence 2014: Yaniv Miron: ATMs – We kick their ass
CONFidence 2014: Yaniv Miron: ATMs – We kick their ass
PROIDEA
 
Introduction to embedded systems
Introduction  to embedded systemsIntroduction  to embedded systems
Introduction to embedded systems
RAMPRAKASHT1
 
Trusted _Computing _security mobile .ppt
Trusted _Computing _security mobile .pptTrusted _Computing _security mobile .ppt
Trusted _Computing _security mobile .ppt
naghamallella
 
Standardizing the tee with global platform and RISC-V
Standardizing the tee with global platform and RISC-VStandardizing the tee with global platform and RISC-V
Standardizing the tee with global platform and RISC-V
RISC-V International
 

Similar to Trusted Platform Module (TPM) (20)

Trusted Computing security _platform.ppt
Trusted Computing security _platform.pptTrusted Computing security _platform.ppt
Trusted Computing security _platform.ppt
 
trusted computing platform alliancee.ppt
trusted computing platform alliancee.ppttrusted computing platform alliancee.ppt
trusted computing platform alliancee.ppt
 
Track 5 session 3 - st dev con 2016 - mechanisms for trusted code execution...
Track 5   session 3 - st dev con 2016 - mechanisms for trusted code execution...Track 5   session 3 - st dev con 2016 - mechanisms for trusted code execution...
Track 5 session 3 - st dev con 2016 - mechanisms for trusted code execution...
 
CSF18 - BitLocker Deep Dive - Sami Laiho
CSF18 - BitLocker Deep Dive - Sami LaihoCSF18 - BitLocker Deep Dive - Sami Laiho
CSF18 - BitLocker Deep Dive - Sami Laiho
 
TC and TPM.ppt
TC and TPM.pptTC and TPM.ppt
TC and TPM.ppt
 
Hardware_root_trust_x86.pptx
Hardware_root_trust_x86.pptxHardware_root_trust_x86.pptx
Hardware_root_trust_x86.pptx
 
CSF18 - The Night is Dark and Full of Hackers - Sami Laiho
CSF18 - The Night is Dark and Full of Hackers - Sami LaihoCSF18 - The Night is Dark and Full of Hackers - Sami Laiho
CSF18 - The Night is Dark and Full of Hackers - Sami Laiho
 
Managing bitlocker with MBAM
Managing bitlocker with MBAMManaging bitlocker with MBAM
Managing bitlocker with MBAM
 
Windows 7 professional Vs Windows 7 enterprise
Windows 7 professional Vs Windows 7 enterpriseWindows 7 professional Vs Windows 7 enterprise
Windows 7 professional Vs Windows 7 enterprise
 
Embedded systems
Embedded systemsEmbedded systems
Embedded systems
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
 
Design of control unit.pptx
Design of control unit.pptxDesign of control unit.pptx
Design of control unit.pptx
 
Reconfigurable trust forembeddedcomputingplatforms
Reconfigurable trust forembeddedcomputingplatformsReconfigurable trust forembeddedcomputingplatforms
Reconfigurable trust forembeddedcomputingplatforms
 
Thesis presentation
Thesis presentationThesis presentation
Thesis presentation
 
CSF18 - GDPR - Sami Laiho
CSF18 - GDPR - Sami LaihoCSF18 - GDPR - Sami Laiho
CSF18 - GDPR - Sami Laiho
 
HKG18-223 - Trusted FirmwareM: Trusted boot
HKG18-223 - Trusted FirmwareM: Trusted bootHKG18-223 - Trusted FirmwareM: Trusted boot
HKG18-223 - Trusted FirmwareM: Trusted boot
 
CONFidence 2014: Yaniv Miron: ATMs – We kick their ass
CONFidence 2014: Yaniv Miron: ATMs – We kick their assCONFidence 2014: Yaniv Miron: ATMs – We kick their ass
CONFidence 2014: Yaniv Miron: ATMs – We kick their ass
 
Introduction to embedded systems
Introduction  to embedded systemsIntroduction  to embedded systems
Introduction to embedded systems
 
Trusted _Computing _security mobile .ppt
Trusted _Computing _security mobile .pptTrusted _Computing _security mobile .ppt
Trusted _Computing _security mobile .ppt
 
Standardizing the tee with global platform and RISC-V
Standardizing the tee with global platform and RISC-VStandardizing the tee with global platform and RISC-V
Standardizing the tee with global platform and RISC-V
 

More from k33a

An Overview of Consumer Privacy Regulations for TSPs in India
An Overview of Consumer Privacy Regulations for TSPs in IndiaAn Overview of Consumer Privacy Regulations for TSPs in India
An Overview of Consumer Privacy Regulations for TSPs in India
k33a
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
k33a
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
k33a
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
k33a
 
Unified Extensible Firmware Interface (UEFI)
Unified Extensible Firmware Interface (UEFI)Unified Extensible Firmware Interface (UEFI)
Unified Extensible Firmware Interface (UEFI)
k33a
 
The Communist Manifesto
The Communist ManifestoThe Communist Manifesto
The Communist Manifestok33a
 

More from k33a (6)

An Overview of Consumer Privacy Regulations for TSPs in India
An Overview of Consumer Privacy Regulations for TSPs in IndiaAn Overview of Consumer Privacy Regulations for TSPs in India
An Overview of Consumer Privacy Regulations for TSPs in India
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Unified Extensible Firmware Interface (UEFI)
Unified Extensible Firmware Interface (UEFI)Unified Extensible Firmware Interface (UEFI)
Unified Extensible Firmware Interface (UEFI)
 
The Communist Manifesto
The Communist ManifestoThe Communist Manifesto
The Communist Manifesto
 

Recently uploaded

How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 

Recently uploaded (20)

How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 

Trusted Platform Module (TPM)

  • 2. INTRODUCTION • The Trusted Platform Module (TPM) is an international standard for a secure crypto-processor. • The TPM technical specification was written by a computer industry consortium called the Trusted Computing Group (TCG). • The International Organization for Standardization (ISO) and the International Electro-technical Commission (IEC) standardized the specification as ISO/IEC 11889 in 2009. 2 of 36
  • 3. ABBREVIATIONS • • • • • • • • • • • • • • • • TPM – Trusted Platform Module TCG – Trusted Computing Group TCB - Trusted Computing Base BIOS – Basic Input-Output System EK – Endorsement Key SRK – Storage Root Key PCR – Platform Configuration Register AIK – Attestation Identity Key ROT – Root of Trust CRTM – Core Root of Trust RTM – Root of Trust for Measurement RTR – Root of Trust for Reporting RTS – Root of Trust for Storage MBR – Master Boot Record GRUB – Grand Unified Boot Loader DRM – Digital Rights Management 3 of 36
  • 4. TRUSTED COMPUTING GROUP • The Trusted Computing Group (2003), successor to the Trusted Computing Platform Alliance (TCPA) • An initiative started by AMD, Cisco, Hewlett-Packard, IBM, Intel, Microsoft and Wave Systems Corp. • TCG is a non-profit organization formed to develop, define, and promote open standards for hardware-enabled trusted computing and security technologies, including hardware building blocks and software interfaces across multiple platforms • Promoters + Contributors + Adopters = 108 4 of 36
  • 5. TRUSTED COMPUTING BASE Trusted Computing Base Trusted Computing Environment Applications 5 of 36
  • 6. TRUSTED COMPUTING • The computer will consistently behave in expected ways, and those behaviors will be enforced by computer hardware and software • Enforcing this behavior is achieved by loading the hardware with a unique encryption key inaccessible to the rest of the system • TC is controversial as the hardware is not only secured for its owner, but also secured against its owner 6 of 36
  • 7. FUNDAMENTAL TRUSTED COMPUTING FUNCTIONALITY • A mechanism is required to record (measure) what software is/was running • • • • Requires to monitor the boot process Needs an anchor to start the measurement from a Root of Trust Nobody should be able to modify or forge these measurements Some shielded location for the measurements is required 7 of 36
  • 8. FUNDAMENTAL TRUSTED COMPUTING FUNCTIONALITY • Now you know that your platform is in a defined state • Why should someone else believe this claim? • A mechanism to securely report the measurements to a 3rd party is required • Secure storage • Allow access to data only if system is in a known state • Cost efficient implementation and production 8 of 36
  • 9. TPM SPECIFICATION Design Principles TPM Structures TPM Specifications for 1.2 TPM Commands Compliance 9 of 36
  • 11. TPM • The TPM is a platform component • NOT a platform all by itself • TPM becomes a permanent component of the platform • The TPM is NOT an active component, always a responder to a request and never initiates an interrupt or other such operation • TPM cannot alter execution flow of system (e.g. booting, execution of applications) 11 of 36
  • 12. TPM: CHANGES TO PC • Extra hardware • TPM • Single 33 MHz clock • Software changes • BIOS • OS & Apps 12 of 36
  • 14. PLATFORM CONFIGURATION REGISTERS • There are at least 16 PCRs in a TPM. • They store platform configuration measurements. • These measurements are normally hash values (SHA-1) of entities (applications) running on the platform. • PCRs can not be written directly; data is stored by a process called extending the PCR. • PCR = SHA-1(PCR + measurement) • PCR extends are not commutative • PCRs initialized to default value (e.g. 0) at boot time • After boot, PCRs contain hash chain of booted software 14 of 36
  • 15. INTEGRITY MEASUREMENT WITH TPM • A measures entity B (could be executable or other files ...). Result is a B's "fingerprint". • This fingerprint is stored in a Stored Measurement Log (SML) which resides in the hard drive (outside, and not protected by a TPM). • A then inserts B's fingerprint into a PCR (via the PCR's extend operation). • Control is passed to B. 15 of 36
  • 17. ROOTS OF TRUST • Root of Trust is a hardware or software mechanism that one implicitly trusts • Root of Trust for Measurement (RTM) • Uses Platform Configuration Registers (PCR) to record the state of a system • Static entity like the PC BIOS • Root of Trust for Reporting (RTR) • Entity trusted to report information accurately and correctly • Uses PCR and RSA signatures to report the platform state to external parties in an unforgettable way • Root of Trust for Storage (RTS) • Entity trusted to store information without interference leakage • Uses PCR and RSA encryption to protect data and ensure that data can only be accessed if platform is in a known state 17 of 36
  • 18. ROOT OF TRUST FOR MEASUREMENT • Involved steps: • Measure (compute the hash value of) the next entity: e.g. the BIOS measures the OS loader • The measurement is extended into one of the TPM PCR • Control is passed to the measured entity • This process is continued for all components of a system up to user level applications • Measurements change with system updates and patches 18 of 36
  • 19. ROOT OF TRUST FOR REPORTING • Endorsement Key (EK) forms the RTR • Private part never leaves the TPM (only exists in shielded location) • EK is unique for every TPM and therefore uniquely identifies a TPM • The EK is backed by an EK certificate typically issued by the TPM manufacturer • The EK certificate guarantees that the key actually is an EK and is protected by a genuine TPM 19 of 36
  • 20. ROOT OF TRUST FOR STORAGE • Two approaches • Without using PCR: bind/unbind • With using PCR: seal/unseal • Binding • Happens outside of the TPM • Encrypt data with the public part of a TPM key • Only the TPM that the key pair belongs to can decrypt the data and private key can only be used inside the TPM • Binding to a specific TPM, use a non-migratable binding key (migratable keys can also be used) • Unbinding • Decryption of bound data inside the TPM using the private key 20 of 36
  • 21. TPM KEYS • Storage Root Key (SRK) • • • • 2048 bit RSA key Is top level element of TPM key hierarchy Created during take ownership Non-migratable, store inside the chip, can be removed • Storage Keys • RSA keys used to wrap (encrypt) other elements in the TPM key hierarchy • Created during user initialization • Signature Keys • RSA keys used for signing operations • Must be a leaf in the TPM key hierarchy 21 of 36
  • 22. KEY CONCEPTS • Endorsement key • Secure input and output • Memory curtaining / protected execution • Sealed storage • Remote attestation 22 of 36
  • 23. ENDORSEMENT KEY • The endorsement key is a 2048-bit RSA public and private key pair • Created randomly on the chip at manufacture time • Non-migratable, store inside the chip, cannot be removed • It is never used for encryption or signing 23 of 36
  • 24. SECURE INPUT AND OUTPUT • Secure I/O provides a secure hardware path from the keyboard to an application • From the application back to the screen. • No other software running on the same PC will be able to determine what the user typed, or how the application responded. 24 of 36
  • 25. MEMORY CURTAINING • Memory curtaining extends common memory protection techniques to provide full isolation of sensitive areas of memory • Even the operating system does not have full access to curtained memory • The exact implementation details are vendor specific 25 of 36
  • 26. SEALED STORAGE • Sealed storage protects private information by binding it to platform configuration information including the software and hardware being used • Data can be released only to a particular combination of software and hardware • Embedding PCR values in blob ensures that only certain apps can decrypt data • Messing with MBR or OS kernel will change PCR values 26 of 36
  • 27. SEALED STORAGE • Encrypt data using RSA key on TPM • TPM_Seal • • • • (some) Arguments: keyhandle: which TPM key to encrypt with KeyAuth: Password for using key `keyhandle’ PcrValues: PCRs to embed in encrypted blob data block: at most 256 bytes (2048 bits) • Used to encrypt symmetric key (e.g. AES) • Returns encrypted blob. • Blob can only be decrypted with TPM_Unseal when: • PCR-reg-vals = PCR-vals in blob. • TPM_Unseal will fail otherwise 27 of 36
  • 28. REMOTE ATTESTATION • Remote attestation allows changes to the user's computer to be detected by authorized parties • Good applications: • Bank allows money transfer only if customer’s machine runs “up-to-date” OS patches. • Enterprise allows laptop to connect to its network only if laptop runs “authorized” software • Quake players can join a Quake network only if their Quake client is unmodified. • DRM: • Music Stores sell content for authorized players only. 28 of 36
  • 29. REMOTE ATTESTATION- HOW IT WORKS • Recall: EK private key on TPM. • Cert for EK public-key issued by TPM vendor. • Step 1: Create Attestation Identity Key (AIK) • AIK Private key known only to TPM • AIK public cert issued only if EK cert is valid 29 of 36
  • 30. REMOTE ATTESTATION- HOW IT WORKS • Step 2: sign PCR values (after boot) • Call TPM_Quote (some) Arguments: • keyhandle: which AIK key to sign with • KeyAuth: Password for using key `keyhandle’ • PCR List: Which PCRs to sign. • Challenge: 20-byte challenge from remote server • Prevents replay of old signatures. • Userdata: additional data to include in sig. • Returns signed data and signature. 30 of 36
  • 31. MISCONCEPTIONS CLARIFIED • The TPM does not measure, monitor or control anything • The TPM is a passive device in the system • The TPM has no way of knowing what was measured • Measurements are made by host software and sent to the TPM • TPM does not perform bulk encryption • (e.g. File and Folder encryption or Full Disk encryption) • Digital Right Management (DRM) is not a goal of TCG specifications • All technical aspects of DRM are not inherent in the TPM • TPM can work with any operating systems or application software • The specification is open and the API is defined, no TCG secrets 31 of 36
  • 32. BENEFITS • • • • • • • Enhance confidence in platform Proof that a platform is a Trusted Platform Binding of data to a particular platform Sealing data to a trusted system state/configuration Owner privacy and control Secure boot Low cost exportable technology 32 of 36
  • 33. CRITICISM • • • • • • Digital rights management Users unable to modify software Users have no control over data Users unable to exercise legal rights Users vulnerable to vendor withdrawal of service Users unable to override 33 of 36
  • 34. STANDARDIZATION • JTC1, a joint committee of the International Organization for Standardization, or ISO, and IEC, the International Electro-technical Commission, has accepted and published the Trusted Computing Group Trusted Platform Module specification Version 1.2 as ISO/IEC standard 11889. • Abstract • ISO/IEC 11889 defines the Trusted Platform Module (TPM), a device that enables trust in computing platforms in general. ISO/IEC 11889-1:2009 is an overview of the TPM. It describes the TPM and how it fits into the trusted platform. ISO/IEC 11889-1:2009 describes trusted platform concepts such as the trust boundary, transitive trust, integrity measurement, and integrity reporting. 34 of 36