SlideShare a Scribd company logo
Network Security and TrustedNetwork Security and Trusted
ComputingComputing
Trusted Computing
Introduction and Technical Overview
Joe Pato
HP Labs (owner)Dr. Zubair Ahmad KhattakDr. Zubair Ahmad Khattak (instructor)(instructor)
Department of Computer ScienceDepartment of Computer Science
• Increase consumer
and businesses
confidence
• Protect end-user
private data
– by enabling trust in end
systems behavior
• Reduce business risks
– by enabling trust in the
behavior (activities or
actions) of critical
information systems
Why TrustedWhy Trusted
ComputingComputing
Platforms?Platforms?
Trusted Computing
Platform properties
• Recognize that a platform has
known properties
– Mobile platform access to
corporate network.
– Remote Access via known public
access point.
• Identify that a system will behave
as expected:
– Mobile access to corporate
network with firewall and antivirus
requirements.
– Outsourced platform
administration
• Enable a user to have more
confidence in the behavior of the
platform in front of them
– Trust a platform to handle my
private data i.e., banking…
– Achieving WYSIWYS: What You
Sign Is What You See…
Do I have
confidence in
interacting with
this platform?
Can I trust you
to be what you
say you are?
Can I trust you
to behave in an
expected
manner?
Trusted Computing Group (TCG)/Trusted Computing Group (TCG)/
The Trusted Computing PlatformThe Trusted Computing Platform
Alliance (TCPA)Alliance (TCPA)
Trusted
Computing
Group (TCG)
• An Industry work group
focused on defining and
advancing the concept of
Trusted Computing
• Founded in 1999 by Compaq,
HP, IBM, Intel, and Microsoft.
• 180+ members from the
hardware, software,
communications, and security
technology industries
The TCG (or
TCPA) charter
• Provide a omnipresent and
widely adopted means to
address trustworthiness of
computing platforms
• Publish an open specification
for public review
• Define a technology
specification that can be
applied to any type of
computing platform (not just
PCs!)
TPM
Evaluation
completed by
NIST 8/02
Platform
In development
Common
criteria
conformance
specs
Technology
architecture
specs
TCG specification
activity
TCG/ TCPA
Generic
Platform
Spec
PC
Specific
2002 onwards
Founded 1999
Specification revised
by membership
Feb ‘01
Sept ‘01
Internet
Appliances
Mobile
Phones
Servers
TCG/TCPA
concepts
• Definition:
A platform can be trusted if it behaves in the
expected manner for the intended purpose
OR
Trusted Computing Group’s working
definition:
An entity can be trusted if it always behaves
in the expected manner for the intended
purpose. (TCG 2004)
• TCG/TCPA technology provides mechanisms
for:
– Platform Authentication and Attestation
• Identify the platform and its
properties to a challenging party
– Platform Integrity Reporting
• Reliably measure and report on the
platform’s software state
– Protected Storage
• Protect private and secret data.
Protect integrity and identity
information
The TCG/TCPA architecture
relies on the concept of a Root of
Trust
• A third party can rely on
information provided by a platform’s
Root of Trust
• The root of trust must be able to
report on software that has executed
• The root of trust must be able to
keep secrets from the rest of the
platform
⇒ measure the first piece of code
that executes when the platform
boots
⇒ independent computing engine
⇒ “secret” storage
How does
TCG/TCP
A achieve
this?
• A Root of Trust for Storage
− A trusted implementation of a
shielded location for one or
more secret keys—probably
just one, the storage root key
(SRK);
• A Root of Trust for Reporting
– The component that can be
trusted to store and report
reliable information about the
platform
• A Root of Trust for Measurement
– The component that can be
trusted to reliably measure and
report to the Root of Trust for
reporting what software
executes on platform boot
Three Roots of
Trust:
Measurement,
Store and
Reporting
• It is necessary to trust these
Roots of Trust for TCG/ TCPA
mechanisms
The Trusted
Platform Module
- TPM -
• The TPM is the Root
of Trust for Reporting
• Think: smartcard-like security
capability embedded into the
platform
– The TPM is uniquely
bound to a single
platform
– TPM functions and
storage are isolated
from all other
components of the
platform (e.g., the CPU)
random number
generation
Non-volatile
Memory
Processor Memory
asymmetric
key
generation
signing and
encryption
power detectionclock/timer
I/O
HMAC
hash
The Core
Root of Trust
for
Measurement
- CRTM -
• The CRTM is the first
piece of code that
executes on a platform at
boot time. (I.e. Bios or Bios
BootBlock in an IA-32
platform)
– It must be trusted to
properly report to the
TPM what software
executes after it.
– Only authorized
entities must be able to
reflash the CRTM…
(those that vouch for its
behavior)
CRTM and TPM during the boot
process
The Authenticated boot process
CRTM - Bios
BootBlock BIOS
OpRom1
OSLoader
OpRom 2 OpRomN
OS
Hash code
TPMReport Hashed code
Hand-Off
Hash code
Hand-Off
Hash code
Hand-Off
Report Hashed code
Report Hashed code
Hash code
Hash code
• Platform authentication
•Protected Storage• Integrity Reporting
TCG/ TCPA
feature-set
Platform
Authentication
• TCG/ TCPA provides for the TPM to
have control over “multiple
pseudonymous attestation identities”
• TPM attestation identities do not
contain any owner/user related
information
=> A platform identity attests to
platform properties
• No single TPM “identity” is ever used
to digital sign data
=> privacy protection
• TPM Identity certification is required to
attest to the fact that they identify a
genuine TCG/TCPA platform
• The TPM Identity creation protocol
allows for to choose different
Certification Authorities (Privacy-CA) to
certify each TPM identity
Generating an identity
Certificates
Under Owner’s
control for Privacy
Identity
Certificate
Identity-binding
Identity
Certification Authority
OwnerOwner
CA
ABCABC
Integrity
Reporting
• Measurements reported to the
TPM during (and after) the boot
process can not be removed or
deleted until reboot
=> No hiding code that has
executed on the platform
• The TPM will use an attestation
identity to sign the integrity
report
• The recipient of integrity
information can evaluate
trustworthiness of the
information based on the
certificate of attestation identity
 Trust that the TPM is a
genuine TPM on a
genuine Trusted
Platform
Integrity
Reporting (2)
• The recipient of reporting
information relies on “signed
certificates” that attest that a
given measurement represents a
known piece of code
– Cert(Phoenix BIOS v1.2 has
hash value of H)
– Cert(CorpIT config, combined
hash value)
• The recipient can verify these
Integrity Metrics Certificates and
compare certified metrics to
reported metrics
 Trust that the reported
metrics correspond to
certified software
Trusting the reported software is
dependent on the recipient’s
policy
Protected Storage
• Cryptographic keys can be
created that are protected by
the TPM
• Data can be encrypted using
the TPM, that can only be
decrypted using this same
TPM
• A specific software
configuration can also be
specified, that will be
required for the TPM to allow
data to be decrypted, or keys
to be used
 This is called Sealing:
parameters define which
Integrity Metrics the data
should be sealed to
Protected Storage
Hierarchy
Storage Keys
TPM
Protects (Stored Internally)
Protects (Using encryption)
Storage Root Key (Asymmetric key)
Signature
key
Signature
key
Protects (using encryption)
Protects (using encryption)
Storage key
Symmetric key
Asymmetric
key
(signs data)
Authorization
secret
Secret
Data
Secret
Data
Secret
Data
Secret
Data
Asymmetric Keys
Arbitrary data
TPM Protected Objects
Privacy-positive design
• Notion of TPM Owner, think Platform Administrator
• Ultimate TPM functionality control goes to the Owner
• TPM Activation controlled by the Owner, and
deactivation available to the User
• No single TPM “identity” is ever used to digitally sign
data
• Multiple pseudonymous IDs (limits correlation)
• Remote control of the TPM enabled by challenge
response protocols for authorization mechanisms
• Can prevent the revelation of secrets unless the
software state is in an approved state
Short term TCG/TCPA benefits –
protected storage
(Platform with a TPM, associated software provided by the TPM
manufacturer)
Customers can encrypt the data on their hard disks in a way
that is much more secure than software solutions.
– The TCG/TCPA chip is a portal to encrypted data.
– Encrypted data can then only ever be decrypted on the
same platform that encrypted it.
– TCG/TCPA also provides for digital signature keys to be
protected and used by the embedded hardware chip
Middle term TCG/TCPA benefits –
integrity checking
(Short term solution plus additional software)
Protection against hacker scripts, by automatically preventing
access to data if unauthorised programs are executed.
– TCG/TCPA provides for the measurement of integrity
metrics of the software environment on the TCG/TCPA
platform.
– Allows for a remote party to verify what the software
environment on a TCG/TCPA platform is.
– The TCG/TCPA chip can then be used to encrypt data to
disk so that this data can only ever be decrypted on that
same platform, and ONLY if the platform has a given set of
software environment integrity metrics.
Long term TCG/TCPA benefits –
e-commerce
Customers and their partners/suppliers/customers can connect
their IT systems and expose only the data that is intended to
be exposed.
– TCG/TCPA is designed so that platform identities and
Integrity Metrics can be proven reliably to previously
unknown parties.
– Secure online discovery of platforms and services:
confidence in the information about the software
environment and identity of a remote party, enabling higher
levels of trust when interacting with this party.
Ad

More Related Content

What's hot (20)

BKK16-201 Play Ready OPTEE Integration with Secure Video Path lhg-1
BKK16-201 Play Ready OPTEE Integration with Secure Video Path lhg-1BKK16-201 Play Ready OPTEE Integration with Secure Video Path lhg-1
BKK16-201 Play Ready OPTEE Integration with Secure Video Path lhg-1
Linaro
 
Qnx os
Qnx os Qnx os
Qnx os
Student
 
Secure Boot on ARM systems – Building a complete Chain of Trust upon existing...
Secure Boot on ARM systems – Building a complete Chain of Trust upon existing...Secure Boot on ARM systems – Building a complete Chain of Trust upon existing...
Secure Boot on ARM systems – Building a complete Chain of Trust upon existing...
Linaro
 
Real time operating systems (rtos) concepts 1
Real time operating systems (rtos) concepts 1Real time operating systems (rtos) concepts 1
Real time operating systems (rtos) concepts 1
Abu Bakr Ramadan
 
Q4.11: Introduction to eMMC
Q4.11: Introduction to eMMCQ4.11: Introduction to eMMC
Q4.11: Introduction to eMMC
Linaro
 
LTE Redirection attacks: Zhang Shan
LTE Redirection attacks: Zhang ShanLTE Redirection attacks: Zhang Shan
LTE Redirection attacks: Zhang Shan
Darren Pauli
 
Overview on NUMA
Overview on NUMAOverview on NUMA
Overview on NUMA
Abed Maatalla
 
FreeRTOS Course - Semaphore/Mutex Management
FreeRTOS Course - Semaphore/Mutex ManagementFreeRTOS Course - Semaphore/Mutex Management
FreeRTOS Course - Semaphore/Mutex Management
Amr Ali (ISTQB CTAL Full, CSM, ITIL Foundation)
 
Qemu
QemuQemu
Qemu
Koganti Ravikumar
 
The trusted computing architecture
The trusted computing architectureThe trusted computing architecture
The trusted computing architecture
G Prachi
 
Multicore and AUTOSAR
Multicore and AUTOSARMulticore and AUTOSAR
Multicore and AUTOSAR
Hansang Lee
 
LCU13: An Introduction to ARM Trusted Firmware
LCU13: An Introduction to ARM Trusted FirmwareLCU13: An Introduction to ARM Trusted Firmware
LCU13: An Introduction to ARM Trusted Firmware
Linaro
 
HADR Best Practices (High Availability Disaster Recovery)
HADR Best Practices (High Availability Disaster Recovery)HADR Best Practices (High Availability Disaster Recovery)
HADR Best Practices (High Availability Disaster Recovery)
Rocket Software
 
EE6602 Embedded System
EE6602 Embedded SystemEE6602 Embedded System
EE6602 Embedded System
rmkceteee
 
Tensor Processing Unit (TPU)
Tensor Processing Unit (TPU)Tensor Processing Unit (TPU)
Tensor Processing Unit (TPU)
Antonios Katsarakis
 
VHDL Reference
VHDL ReferenceVHDL Reference
VHDL Reference
Eslam Mohammed
 
Lte protocol-stack-mac-rlc-pdcp
Lte protocol-stack-mac-rlc-pdcpLte protocol-stack-mac-rlc-pdcp
Lte protocol-stack-mac-rlc-pdcp
Prashant Sengar
 
05.2 virtio introduction
05.2 virtio introduction05.2 virtio introduction
05.2 virtio introduction
zenixls2
 
Embedded Linux on ARM
Embedded Linux on ARMEmbedded Linux on ARM
Embedded Linux on ARM
Emertxe Information Technologies Pvt Ltd
 
TRex Realistic Traffic Generator - Stateless support
TRex  Realistic Traffic Generator  - Stateless support TRex  Realistic Traffic Generator  - Stateless support
TRex Realistic Traffic Generator - Stateless support
Hanoch Haim
 
BKK16-201 Play Ready OPTEE Integration with Secure Video Path lhg-1
BKK16-201 Play Ready OPTEE Integration with Secure Video Path lhg-1BKK16-201 Play Ready OPTEE Integration with Secure Video Path lhg-1
BKK16-201 Play Ready OPTEE Integration with Secure Video Path lhg-1
Linaro
 
Secure Boot on ARM systems – Building a complete Chain of Trust upon existing...
Secure Boot on ARM systems – Building a complete Chain of Trust upon existing...Secure Boot on ARM systems – Building a complete Chain of Trust upon existing...
Secure Boot on ARM systems – Building a complete Chain of Trust upon existing...
Linaro
 
Real time operating systems (rtos) concepts 1
Real time operating systems (rtos) concepts 1Real time operating systems (rtos) concepts 1
Real time operating systems (rtos) concepts 1
Abu Bakr Ramadan
 
Q4.11: Introduction to eMMC
Q4.11: Introduction to eMMCQ4.11: Introduction to eMMC
Q4.11: Introduction to eMMC
Linaro
 
LTE Redirection attacks: Zhang Shan
LTE Redirection attacks: Zhang ShanLTE Redirection attacks: Zhang Shan
LTE Redirection attacks: Zhang Shan
Darren Pauli
 
The trusted computing architecture
The trusted computing architectureThe trusted computing architecture
The trusted computing architecture
G Prachi
 
Multicore and AUTOSAR
Multicore and AUTOSARMulticore and AUTOSAR
Multicore and AUTOSAR
Hansang Lee
 
LCU13: An Introduction to ARM Trusted Firmware
LCU13: An Introduction to ARM Trusted FirmwareLCU13: An Introduction to ARM Trusted Firmware
LCU13: An Introduction to ARM Trusted Firmware
Linaro
 
HADR Best Practices (High Availability Disaster Recovery)
HADR Best Practices (High Availability Disaster Recovery)HADR Best Practices (High Availability Disaster Recovery)
HADR Best Practices (High Availability Disaster Recovery)
Rocket Software
 
EE6602 Embedded System
EE6602 Embedded SystemEE6602 Embedded System
EE6602 Embedded System
rmkceteee
 
Lte protocol-stack-mac-rlc-pdcp
Lte protocol-stack-mac-rlc-pdcpLte protocol-stack-mac-rlc-pdcp
Lte protocol-stack-mac-rlc-pdcp
Prashant Sengar
 
05.2 virtio introduction
05.2 virtio introduction05.2 virtio introduction
05.2 virtio introduction
zenixls2
 
TRex Realistic Traffic Generator - Stateless support
TRex  Realistic Traffic Generator  - Stateless support TRex  Realistic Traffic Generator  - Stateless support
TRex Realistic Traffic Generator - Stateless support
Hanoch Haim
 

Similar to Trusted computing introduction and technical overview (20)

trusted computing platform alliancee.ppt
trusted computing platform alliancee.ppttrusted computing platform alliancee.ppt
trusted computing platform alliancee.ppt
naghamallella
 
Trusted Computing security _platform.ppt
Trusted Computing security _platform.pptTrusted Computing security _platform.ppt
Trusted Computing security _platform.ppt
naghamallella
 
Abbie Barbir Tcg Final
Abbie Barbir Tcg FinalAbbie Barbir Tcg Final
Abbie Barbir Tcg Final
Abbie Barbir
 
Standardizing the tee with global platform and RISC-V
Standardizing the tee with global platform and RISC-VStandardizing the tee with global platform and RISC-V
Standardizing the tee with global platform and RISC-V
RISC-V International
 
Why TPM in Automotive?
Why TPM in Automotive?Why TPM in Automotive?
Why TPM in Automotive?
Alan Tatourian
 
BKK16-110~---3892hnfi2r8ru94jofmcw8ujd.pdf
BKK16-110~---3892hnfi2r8ru94jofmcw8ujd.pdfBKK16-110~---3892hnfi2r8ru94jofmcw8ujd.pdf
BKK16-110~---3892hnfi2r8ru94jofmcw8ujd.pdf
satyabratmallaBujarb
 
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEEBKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
Linaro
 
Reconfigurable trust forembeddedcomputingplatforms
Reconfigurable trust forembeddedcomputingplatformsReconfigurable trust forembeddedcomputingplatforms
Reconfigurable trust forembeddedcomputingplatforms
Abdullah Deeb
 
Trusted _Computing _security mobile .ppt
Trusted _Computing _security mobile .pptTrusted _Computing _security mobile .ppt
Trusted _Computing _security mobile .ppt
naghamallella
 
Securing the Internet of Things - Hank Chavers
Securing the Internet of Things - Hank ChaversSecuring the Internet of Things - Hank Chavers
Securing the Internet of Things - Hank Chavers
WithTheBest
 
Trust and Cloud computing, removing the need for the consumer to trust their ...
Trust and Cloud computing, removing the need for the consumer to trust their ...Trust and Cloud computing, removing the need for the consumer to trust their ...
Trust and Cloud computing, removing the need for the consumer to trust their ...
David Wallom
 
Trust and Cloud computing, removing the need for the consumer to trust their ...
Trust and Cloud computing, removing the need for the consumer to trust their ...Trust and Cloud computing, removing the need for the consumer to trust their ...
Trust and Cloud computing, removing the need for the consumer to trust their ...
David Wallom
 
Trust and Cloud Computing, removing the need to trust your cloud provider
Trust and Cloud Computing, removing the need to trust your cloud providerTrust and Cloud Computing, removing the need to trust your cloud provider
Trust and Cloud Computing, removing the need to trust your cloud provider
David Wallom
 
Lessson 3
Lessson 3Lessson 3
Lessson 3
MLG College of Learning, Inc
 
Protecting Data with Short-Lived Encryption Keys and Hardware Root of Trust
Protecting Data with Short-Lived Encryption Keys and Hardware Root of TrustProtecting Data with Short-Lived Encryption Keys and Hardware Root of Trust
Protecting Data with Short-Lived Encryption Keys and Hardware Root of Trust
Dan Griffin
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
Overkill Security
 
DYNAMIC ROOT OF TRUST AND CHALLENGES
DYNAMIC ROOT OF TRUST AND CHALLENGESDYNAMIC ROOT OF TRUST AND CHALLENGES
DYNAMIC ROOT OF TRUST AND CHALLENGES
ijsptm
 
Trusted Computing Base
Trusted Computing BaseTrusted Computing Base
Trusted Computing Base
Vasily Sartakov
 
Secure IOT Gateway
Secure IOT GatewaySecure IOT Gateway
Secure IOT Gateway
LF Events
 
PLNOG15: Simplifying network deployment using Autonomic networking and Plug-a...
PLNOG15: Simplifying network deployment using Autonomic networking and Plug-a...PLNOG15: Simplifying network deployment using Autonomic networking and Plug-a...
PLNOG15: Simplifying network deployment using Autonomic networking and Plug-a...
PROIDEA
 
trusted computing platform alliancee.ppt
trusted computing platform alliancee.ppttrusted computing platform alliancee.ppt
trusted computing platform alliancee.ppt
naghamallella
 
Trusted Computing security _platform.ppt
Trusted Computing security _platform.pptTrusted Computing security _platform.ppt
Trusted Computing security _platform.ppt
naghamallella
 
Abbie Barbir Tcg Final
Abbie Barbir Tcg FinalAbbie Barbir Tcg Final
Abbie Barbir Tcg Final
Abbie Barbir
 
Standardizing the tee with global platform and RISC-V
Standardizing the tee with global platform and RISC-VStandardizing the tee with global platform and RISC-V
Standardizing the tee with global platform and RISC-V
RISC-V International
 
Why TPM in Automotive?
Why TPM in Automotive?Why TPM in Automotive?
Why TPM in Automotive?
Alan Tatourian
 
BKK16-110~---3892hnfi2r8ru94jofmcw8ujd.pdf
BKK16-110~---3892hnfi2r8ru94jofmcw8ujd.pdfBKK16-110~---3892hnfi2r8ru94jofmcw8ujd.pdf
BKK16-110~---3892hnfi2r8ru94jofmcw8ujd.pdf
satyabratmallaBujarb
 
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEEBKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
Linaro
 
Reconfigurable trust forembeddedcomputingplatforms
Reconfigurable trust forembeddedcomputingplatformsReconfigurable trust forembeddedcomputingplatforms
Reconfigurable trust forembeddedcomputingplatforms
Abdullah Deeb
 
Trusted _Computing _security mobile .ppt
Trusted _Computing _security mobile .pptTrusted _Computing _security mobile .ppt
Trusted _Computing _security mobile .ppt
naghamallella
 
Securing the Internet of Things - Hank Chavers
Securing the Internet of Things - Hank ChaversSecuring the Internet of Things - Hank Chavers
Securing the Internet of Things - Hank Chavers
WithTheBest
 
Trust and Cloud computing, removing the need for the consumer to trust their ...
Trust and Cloud computing, removing the need for the consumer to trust their ...Trust and Cloud computing, removing the need for the consumer to trust their ...
Trust and Cloud computing, removing the need for the consumer to trust their ...
David Wallom
 
Trust and Cloud computing, removing the need for the consumer to trust their ...
Trust and Cloud computing, removing the need for the consumer to trust their ...Trust and Cloud computing, removing the need for the consumer to trust their ...
Trust and Cloud computing, removing the need for the consumer to trust their ...
David Wallom
 
Trust and Cloud Computing, removing the need to trust your cloud provider
Trust and Cloud Computing, removing the need to trust your cloud providerTrust and Cloud Computing, removing the need to trust your cloud provider
Trust and Cloud Computing, removing the need to trust your cloud provider
David Wallom
 
Protecting Data with Short-Lived Encryption Keys and Hardware Root of Trust
Protecting Data with Short-Lived Encryption Keys and Hardware Root of TrustProtecting Data with Short-Lived Encryption Keys and Hardware Root of Trust
Protecting Data with Short-Lived Encryption Keys and Hardware Root of Trust
Dan Griffin
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
Overkill Security
 
DYNAMIC ROOT OF TRUST AND CHALLENGES
DYNAMIC ROOT OF TRUST AND CHALLENGESDYNAMIC ROOT OF TRUST AND CHALLENGES
DYNAMIC ROOT OF TRUST AND CHALLENGES
ijsptm
 
Secure IOT Gateway
Secure IOT GatewaySecure IOT Gateway
Secure IOT Gateway
LF Events
 
PLNOG15: Simplifying network deployment using Autonomic networking and Plug-a...
PLNOG15: Simplifying network deployment using Autonomic networking and Plug-a...PLNOG15: Simplifying network deployment using Autonomic networking and Plug-a...
PLNOG15: Simplifying network deployment using Autonomic networking and Plug-a...
PROIDEA
 
Ad

More from Sajid Marwat (15)

Digital Rights Management and Trusted Computing Base
Digital Rights Management and Trusted Computing BaseDigital Rights Management and Trusted Computing Base
Digital Rights Management and Trusted Computing Base
Sajid Marwat
 
Manet
ManetManet
Manet
Sajid Marwat
 
Automata definitions
Automata definitionsAutomata definitions
Automata definitions
Sajid Marwat
 
Thr cellular concept
Thr cellular conceptThr cellular concept
Thr cellular concept
Sajid Marwat
 
Computer System Overview,
Computer System Overview, Computer System Overview,
Computer System Overview,
Sajid Marwat
 
Lec 17 heap data structure
Lec 17 heap data structureLec 17 heap data structure
Lec 17 heap data structure
Sajid Marwat
 
4 g LTE, LTE Advance
4 g LTE, LTE Advance 4 g LTE, LTE Advance
4 g LTE, LTE Advance
Sajid Marwat
 
Advance algorithm hashing lec II
Advance algorithm hashing lec IIAdvance algorithm hashing lec II
Advance algorithm hashing lec II
Sajid Marwat
 
Advance algorithm hashing lec I
Advance algorithm hashing lec IAdvance algorithm hashing lec I
Advance algorithm hashing lec I
Sajid Marwat
 
how to calclute time complexity of algortihm
how to calclute time complexity of algortihmhow to calclute time complexity of algortihm
how to calclute time complexity of algortihm
Sajid Marwat
 
GSM Network 3G Technologies
GSM Network 3G TechnologiesGSM Network 3G Technologies
GSM Network 3G Technologies
Sajid Marwat
 
WiMAX (IEEE 802.16)
WiMAX (IEEE 802.16)WiMAX (IEEE 802.16)
WiMAX (IEEE 802.16)
Sajid Marwat
 
Radio over Fiber Technology for WiMAX Systems
 Radio over Fiber Technology for WiMAX Systems Radio over Fiber Technology for WiMAX Systems
Radio over Fiber Technology for WiMAX Systems
Sajid Marwat
 
Knowledge Representation & Reasoning
Knowledge Representation & ReasoningKnowledge Representation & Reasoning
Knowledge Representation & Reasoning
Sajid Marwat
 
top level view of computer function and interconnection
top level view of computer function and interconnectiontop level view of computer function and interconnection
top level view of computer function and interconnection
Sajid Marwat
 
Digital Rights Management and Trusted Computing Base
Digital Rights Management and Trusted Computing BaseDigital Rights Management and Trusted Computing Base
Digital Rights Management and Trusted Computing Base
Sajid Marwat
 
Automata definitions
Automata definitionsAutomata definitions
Automata definitions
Sajid Marwat
 
Thr cellular concept
Thr cellular conceptThr cellular concept
Thr cellular concept
Sajid Marwat
 
Computer System Overview,
Computer System Overview, Computer System Overview,
Computer System Overview,
Sajid Marwat
 
Lec 17 heap data structure
Lec 17 heap data structureLec 17 heap data structure
Lec 17 heap data structure
Sajid Marwat
 
4 g LTE, LTE Advance
4 g LTE, LTE Advance 4 g LTE, LTE Advance
4 g LTE, LTE Advance
Sajid Marwat
 
Advance algorithm hashing lec II
Advance algorithm hashing lec IIAdvance algorithm hashing lec II
Advance algorithm hashing lec II
Sajid Marwat
 
Advance algorithm hashing lec I
Advance algorithm hashing lec IAdvance algorithm hashing lec I
Advance algorithm hashing lec I
Sajid Marwat
 
how to calclute time complexity of algortihm
how to calclute time complexity of algortihmhow to calclute time complexity of algortihm
how to calclute time complexity of algortihm
Sajid Marwat
 
GSM Network 3G Technologies
GSM Network 3G TechnologiesGSM Network 3G Technologies
GSM Network 3G Technologies
Sajid Marwat
 
WiMAX (IEEE 802.16)
WiMAX (IEEE 802.16)WiMAX (IEEE 802.16)
WiMAX (IEEE 802.16)
Sajid Marwat
 
Radio over Fiber Technology for WiMAX Systems
 Radio over Fiber Technology for WiMAX Systems Radio over Fiber Technology for WiMAX Systems
Radio over Fiber Technology for WiMAX Systems
Sajid Marwat
 
Knowledge Representation & Reasoning
Knowledge Representation & ReasoningKnowledge Representation & Reasoning
Knowledge Representation & Reasoning
Sajid Marwat
 
top level view of computer function and interconnection
top level view of computer function and interconnectiontop level view of computer function and interconnection
top level view of computer function and interconnection
Sajid Marwat
 
Ad

Recently uploaded (20)

U3 ANTITUBERCULAR DRUGS Pharmacology 3.pptx
U3 ANTITUBERCULAR DRUGS Pharmacology 3.pptxU3 ANTITUBERCULAR DRUGS Pharmacology 3.pptx
U3 ANTITUBERCULAR DRUGS Pharmacology 3.pptx
Mayuri Chavan
 
Myasthenia gravis (Neuromuscular disorder)
Myasthenia gravis (Neuromuscular disorder)Myasthenia gravis (Neuromuscular disorder)
Myasthenia gravis (Neuromuscular disorder)
Mohamed Rizk Khodair
 
Origin of Brahmi script: A breaking down of various theories
Origin of Brahmi script: A breaking down of various theoriesOrigin of Brahmi script: A breaking down of various theories
Origin of Brahmi script: A breaking down of various theories
PrachiSontakke5
 
Rock Art As a Source of Ancient Indian History
Rock Art As a Source of Ancient Indian HistoryRock Art As a Source of Ancient Indian History
Rock Art As a Source of Ancient Indian History
Virag Sontakke
 
antiquity of writing in ancient India- literary & archaeological evidence
antiquity of writing in ancient India- literary & archaeological evidenceantiquity of writing in ancient India- literary & archaeological evidence
antiquity of writing in ancient India- literary & archaeological evidence
PrachiSontakke5
 
History Of The Monastery Of Mor Gabriel Philoxenos Yuhanon Dolabani
History Of The Monastery Of Mor Gabriel Philoxenos Yuhanon DolabaniHistory Of The Monastery Of Mor Gabriel Philoxenos Yuhanon Dolabani
History Of The Monastery Of Mor Gabriel Philoxenos Yuhanon Dolabani
fruinkamel7m
 
Pope Leo XIV, the first Pope from North America.pptx
Pope Leo XIV, the first Pope from North America.pptxPope Leo XIV, the first Pope from North America.pptx
Pope Leo XIV, the first Pope from North America.pptx
Martin M Flynn
 
Cultivation Practice of Onion in Nepal.pptx
Cultivation Practice of Onion in Nepal.pptxCultivation Practice of Onion in Nepal.pptx
Cultivation Practice of Onion in Nepal.pptx
UmeshTimilsina1
 
The role of wall art in interior designing
The role of wall art in interior designingThe role of wall art in interior designing
The role of wall art in interior designing
meghaark2110
 
Form View Attributes in Odoo 18 - Odoo Slides
Form View Attributes in Odoo 18 - Odoo SlidesForm View Attributes in Odoo 18 - Odoo Slides
Form View Attributes in Odoo 18 - Odoo Slides
Celine George
 
Ancient Stone Sculptures of India: As a Source of Indian History
Ancient Stone Sculptures of India: As a Source of Indian HistoryAncient Stone Sculptures of India: As a Source of Indian History
Ancient Stone Sculptures of India: As a Source of Indian History
Virag Sontakke
 
LDMMIA Reiki News Ed3 Vol1 For Team and Guests
LDMMIA Reiki News Ed3 Vol1 For Team and GuestsLDMMIA Reiki News Ed3 Vol1 For Team and Guests
LDMMIA Reiki News Ed3 Vol1 For Team and Guests
LDM & Mia eStudios
 
spinal cord disorders (Myelopathies and radiculoapthies)
spinal cord disorders (Myelopathies and radiculoapthies)spinal cord disorders (Myelopathies and radiculoapthies)
spinal cord disorders (Myelopathies and radiculoapthies)
Mohamed Rizk Khodair
 
How To Maximize Sales Performance using Odoo 18 Diverse views in sales module
How To Maximize Sales Performance using Odoo 18 Diverse views in sales moduleHow To Maximize Sales Performance using Odoo 18 Diverse views in sales module
How To Maximize Sales Performance using Odoo 18 Diverse views in sales module
Celine George
 
Drugs in Anaesthesia and Intensive Care,.pdf
Drugs in Anaesthesia and Intensive Care,.pdfDrugs in Anaesthesia and Intensive Care,.pdf
Drugs in Anaesthesia and Intensive Care,.pdf
crewot855
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 9 THEO ĐƠN VỊ BÀI HỌC - GLOBAL SUCCESS - CẢ NĂM (TỪ...
BÀI TẬP BỔ TRỢ TIẾNG ANH 9 THEO ĐƠN VỊ BÀI HỌC - GLOBAL SUCCESS - CẢ NĂM (TỪ...BÀI TẬP BỔ TRỢ TIẾNG ANH 9 THEO ĐƠN VỊ BÀI HỌC - GLOBAL SUCCESS - CẢ NĂM (TỪ...
BÀI TẬP BỔ TRỢ TIẾNG ANH 9 THEO ĐƠN VỊ BÀI HỌC - GLOBAL SUCCESS - CẢ NĂM (TỪ...
Nguyen Thanh Tu Collection
 
Ajanta Paintings: Study as a Source of History
Ajanta Paintings: Study as a Source of HistoryAjanta Paintings: Study as a Source of History
Ajanta Paintings: Study as a Source of History
Virag Sontakke
 
2025 The Senior Landscape and SET plan preparations.pptx
2025 The Senior Landscape and SET plan preparations.pptx2025 The Senior Landscape and SET plan preparations.pptx
2025 The Senior Landscape and SET plan preparations.pptx
mansk2
 
Overview Well-Being and Creative Careers
Overview Well-Being and Creative CareersOverview Well-Being and Creative Careers
Overview Well-Being and Creative Careers
University of Amsterdam
 
U3 ANTITUBERCULAR DRUGS Pharmacology 3.pptx
U3 ANTITUBERCULAR DRUGS Pharmacology 3.pptxU3 ANTITUBERCULAR DRUGS Pharmacology 3.pptx
U3 ANTITUBERCULAR DRUGS Pharmacology 3.pptx
Mayuri Chavan
 
Myasthenia gravis (Neuromuscular disorder)
Myasthenia gravis (Neuromuscular disorder)Myasthenia gravis (Neuromuscular disorder)
Myasthenia gravis (Neuromuscular disorder)
Mohamed Rizk Khodair
 
Origin of Brahmi script: A breaking down of various theories
Origin of Brahmi script: A breaking down of various theoriesOrigin of Brahmi script: A breaking down of various theories
Origin of Brahmi script: A breaking down of various theories
PrachiSontakke5
 
Rock Art As a Source of Ancient Indian History
Rock Art As a Source of Ancient Indian HistoryRock Art As a Source of Ancient Indian History
Rock Art As a Source of Ancient Indian History
Virag Sontakke
 
antiquity of writing in ancient India- literary & archaeological evidence
antiquity of writing in ancient India- literary & archaeological evidenceantiquity of writing in ancient India- literary & archaeological evidence
antiquity of writing in ancient India- literary & archaeological evidence
PrachiSontakke5
 
History Of The Monastery Of Mor Gabriel Philoxenos Yuhanon Dolabani
History Of The Monastery Of Mor Gabriel Philoxenos Yuhanon DolabaniHistory Of The Monastery Of Mor Gabriel Philoxenos Yuhanon Dolabani
History Of The Monastery Of Mor Gabriel Philoxenos Yuhanon Dolabani
fruinkamel7m
 
Pope Leo XIV, the first Pope from North America.pptx
Pope Leo XIV, the first Pope from North America.pptxPope Leo XIV, the first Pope from North America.pptx
Pope Leo XIV, the first Pope from North America.pptx
Martin M Flynn
 
Cultivation Practice of Onion in Nepal.pptx
Cultivation Practice of Onion in Nepal.pptxCultivation Practice of Onion in Nepal.pptx
Cultivation Practice of Onion in Nepal.pptx
UmeshTimilsina1
 
The role of wall art in interior designing
The role of wall art in interior designingThe role of wall art in interior designing
The role of wall art in interior designing
meghaark2110
 
Form View Attributes in Odoo 18 - Odoo Slides
Form View Attributes in Odoo 18 - Odoo SlidesForm View Attributes in Odoo 18 - Odoo Slides
Form View Attributes in Odoo 18 - Odoo Slides
Celine George
 
Ancient Stone Sculptures of India: As a Source of Indian History
Ancient Stone Sculptures of India: As a Source of Indian HistoryAncient Stone Sculptures of India: As a Source of Indian History
Ancient Stone Sculptures of India: As a Source of Indian History
Virag Sontakke
 
LDMMIA Reiki News Ed3 Vol1 For Team and Guests
LDMMIA Reiki News Ed3 Vol1 For Team and GuestsLDMMIA Reiki News Ed3 Vol1 For Team and Guests
LDMMIA Reiki News Ed3 Vol1 For Team and Guests
LDM & Mia eStudios
 
spinal cord disorders (Myelopathies and radiculoapthies)
spinal cord disorders (Myelopathies and radiculoapthies)spinal cord disorders (Myelopathies and radiculoapthies)
spinal cord disorders (Myelopathies and radiculoapthies)
Mohamed Rizk Khodair
 
How To Maximize Sales Performance using Odoo 18 Diverse views in sales module
How To Maximize Sales Performance using Odoo 18 Diverse views in sales moduleHow To Maximize Sales Performance using Odoo 18 Diverse views in sales module
How To Maximize Sales Performance using Odoo 18 Diverse views in sales module
Celine George
 
Drugs in Anaesthesia and Intensive Care,.pdf
Drugs in Anaesthesia and Intensive Care,.pdfDrugs in Anaesthesia and Intensive Care,.pdf
Drugs in Anaesthesia and Intensive Care,.pdf
crewot855
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 9 THEO ĐƠN VỊ BÀI HỌC - GLOBAL SUCCESS - CẢ NĂM (TỪ...
BÀI TẬP BỔ TRỢ TIẾNG ANH 9 THEO ĐƠN VỊ BÀI HỌC - GLOBAL SUCCESS - CẢ NĂM (TỪ...BÀI TẬP BỔ TRỢ TIẾNG ANH 9 THEO ĐƠN VỊ BÀI HỌC - GLOBAL SUCCESS - CẢ NĂM (TỪ...
BÀI TẬP BỔ TRỢ TIẾNG ANH 9 THEO ĐƠN VỊ BÀI HỌC - GLOBAL SUCCESS - CẢ NĂM (TỪ...
Nguyen Thanh Tu Collection
 
Ajanta Paintings: Study as a Source of History
Ajanta Paintings: Study as a Source of HistoryAjanta Paintings: Study as a Source of History
Ajanta Paintings: Study as a Source of History
Virag Sontakke
 
2025 The Senior Landscape and SET plan preparations.pptx
2025 The Senior Landscape and SET plan preparations.pptx2025 The Senior Landscape and SET plan preparations.pptx
2025 The Senior Landscape and SET plan preparations.pptx
mansk2
 
Overview Well-Being and Creative Careers
Overview Well-Being and Creative CareersOverview Well-Being and Creative Careers
Overview Well-Being and Creative Careers
University of Amsterdam
 

Trusted computing introduction and technical overview

  • 1. Network Security and TrustedNetwork Security and Trusted ComputingComputing Trusted Computing Introduction and Technical Overview Joe Pato HP Labs (owner)Dr. Zubair Ahmad KhattakDr. Zubair Ahmad Khattak (instructor)(instructor) Department of Computer ScienceDepartment of Computer Science
  • 2. • Increase consumer and businesses confidence • Protect end-user private data – by enabling trust in end systems behavior • Reduce business risks – by enabling trust in the behavior (activities or actions) of critical information systems Why TrustedWhy Trusted ComputingComputing Platforms?Platforms?
  • 3. Trusted Computing Platform properties • Recognize that a platform has known properties – Mobile platform access to corporate network. – Remote Access via known public access point. • Identify that a system will behave as expected: – Mobile access to corporate network with firewall and antivirus requirements. – Outsourced platform administration • Enable a user to have more confidence in the behavior of the platform in front of them – Trust a platform to handle my private data i.e., banking… – Achieving WYSIWYS: What You Sign Is What You See… Do I have confidence in interacting with this platform? Can I trust you to be what you say you are? Can I trust you to behave in an expected manner?
  • 4. Trusted Computing Group (TCG)/Trusted Computing Group (TCG)/ The Trusted Computing PlatformThe Trusted Computing Platform Alliance (TCPA)Alliance (TCPA)
  • 5. Trusted Computing Group (TCG) • An Industry work group focused on defining and advancing the concept of Trusted Computing • Founded in 1999 by Compaq, HP, IBM, Intel, and Microsoft. • 180+ members from the hardware, software, communications, and security technology industries
  • 6. The TCG (or TCPA) charter • Provide a omnipresent and widely adopted means to address trustworthiness of computing platforms • Publish an open specification for public review • Define a technology specification that can be applied to any type of computing platform (not just PCs!)
  • 7. TPM Evaluation completed by NIST 8/02 Platform In development Common criteria conformance specs Technology architecture specs TCG specification activity TCG/ TCPA Generic Platform Spec PC Specific 2002 onwards Founded 1999 Specification revised by membership Feb ‘01 Sept ‘01 Internet Appliances Mobile Phones Servers
  • 8. TCG/TCPA concepts • Definition: A platform can be trusted if it behaves in the expected manner for the intended purpose OR Trusted Computing Group’s working definition: An entity can be trusted if it always behaves in the expected manner for the intended purpose. (TCG 2004) • TCG/TCPA technology provides mechanisms for: – Platform Authentication and Attestation • Identify the platform and its properties to a challenging party – Platform Integrity Reporting • Reliably measure and report on the platform’s software state – Protected Storage • Protect private and secret data. Protect integrity and identity information
  • 9. The TCG/TCPA architecture relies on the concept of a Root of Trust • A third party can rely on information provided by a platform’s Root of Trust • The root of trust must be able to report on software that has executed • The root of trust must be able to keep secrets from the rest of the platform ⇒ measure the first piece of code that executes when the platform boots ⇒ independent computing engine ⇒ “secret” storage How does TCG/TCP A achieve this?
  • 10. • A Root of Trust for Storage − A trusted implementation of a shielded location for one or more secret keys—probably just one, the storage root key (SRK); • A Root of Trust for Reporting – The component that can be trusted to store and report reliable information about the platform • A Root of Trust for Measurement – The component that can be trusted to reliably measure and report to the Root of Trust for reporting what software executes on platform boot Three Roots of Trust: Measurement, Store and Reporting
  • 11. • It is necessary to trust these Roots of Trust for TCG/ TCPA mechanisms
  • 12. The Trusted Platform Module - TPM - • The TPM is the Root of Trust for Reporting • Think: smartcard-like security capability embedded into the platform – The TPM is uniquely bound to a single platform – TPM functions and storage are isolated from all other components of the platform (e.g., the CPU) random number generation Non-volatile Memory Processor Memory asymmetric key generation signing and encryption power detectionclock/timer I/O HMAC hash
  • 13. The Core Root of Trust for Measurement - CRTM - • The CRTM is the first piece of code that executes on a platform at boot time. (I.e. Bios or Bios BootBlock in an IA-32 platform) – It must be trusted to properly report to the TPM what software executes after it. – Only authorized entities must be able to reflash the CRTM… (those that vouch for its behavior)
  • 14. CRTM and TPM during the boot process The Authenticated boot process CRTM - Bios BootBlock BIOS OpRom1 OSLoader OpRom 2 OpRomN OS Hash code TPMReport Hashed code Hand-Off Hash code Hand-Off Hash code Hand-Off Report Hashed code Report Hashed code Hash code Hash code
  • 15. • Platform authentication •Protected Storage• Integrity Reporting TCG/ TCPA feature-set
  • 16. Platform Authentication • TCG/ TCPA provides for the TPM to have control over “multiple pseudonymous attestation identities” • TPM attestation identities do not contain any owner/user related information => A platform identity attests to platform properties • No single TPM “identity” is ever used to digital sign data => privacy protection • TPM Identity certification is required to attest to the fact that they identify a genuine TCG/TCPA platform • The TPM Identity creation protocol allows for to choose different Certification Authorities (Privacy-CA) to certify each TPM identity
  • 17. Generating an identity Certificates Under Owner’s control for Privacy Identity Certificate Identity-binding Identity Certification Authority OwnerOwner CA ABCABC
  • 18. Integrity Reporting • Measurements reported to the TPM during (and after) the boot process can not be removed or deleted until reboot => No hiding code that has executed on the platform • The TPM will use an attestation identity to sign the integrity report • The recipient of integrity information can evaluate trustworthiness of the information based on the certificate of attestation identity  Trust that the TPM is a genuine TPM on a genuine Trusted Platform
  • 19. Integrity Reporting (2) • The recipient of reporting information relies on “signed certificates” that attest that a given measurement represents a known piece of code – Cert(Phoenix BIOS v1.2 has hash value of H) – Cert(CorpIT config, combined hash value) • The recipient can verify these Integrity Metrics Certificates and compare certified metrics to reported metrics  Trust that the reported metrics correspond to certified software Trusting the reported software is dependent on the recipient’s policy
  • 20. Protected Storage • Cryptographic keys can be created that are protected by the TPM • Data can be encrypted using the TPM, that can only be decrypted using this same TPM • A specific software configuration can also be specified, that will be required for the TPM to allow data to be decrypted, or keys to be used  This is called Sealing: parameters define which Integrity Metrics the data should be sealed to
  • 21. Protected Storage Hierarchy Storage Keys TPM Protects (Stored Internally) Protects (Using encryption) Storage Root Key (Asymmetric key) Signature key Signature key Protects (using encryption) Protects (using encryption) Storage key Symmetric key Asymmetric key (signs data) Authorization secret Secret Data Secret Data Secret Data Secret Data Asymmetric Keys Arbitrary data TPM Protected Objects
  • 22. Privacy-positive design • Notion of TPM Owner, think Platform Administrator • Ultimate TPM functionality control goes to the Owner • TPM Activation controlled by the Owner, and deactivation available to the User • No single TPM “identity” is ever used to digitally sign data • Multiple pseudonymous IDs (limits correlation) • Remote control of the TPM enabled by challenge response protocols for authorization mechanisms • Can prevent the revelation of secrets unless the software state is in an approved state
  • 23. Short term TCG/TCPA benefits – protected storage (Platform with a TPM, associated software provided by the TPM manufacturer) Customers can encrypt the data on their hard disks in a way that is much more secure than software solutions. – The TCG/TCPA chip is a portal to encrypted data. – Encrypted data can then only ever be decrypted on the same platform that encrypted it. – TCG/TCPA also provides for digital signature keys to be protected and used by the embedded hardware chip
  • 24. Middle term TCG/TCPA benefits – integrity checking (Short term solution plus additional software) Protection against hacker scripts, by automatically preventing access to data if unauthorised programs are executed. – TCG/TCPA provides for the measurement of integrity metrics of the software environment on the TCG/TCPA platform. – Allows for a remote party to verify what the software environment on a TCG/TCPA platform is. – The TCG/TCPA chip can then be used to encrypt data to disk so that this data can only ever be decrypted on that same platform, and ONLY if the platform has a given set of software environment integrity metrics.
  • 25. Long term TCG/TCPA benefits – e-commerce Customers and their partners/suppliers/customers can connect their IT systems and expose only the data that is intended to be exposed. – TCG/TCPA is designed so that platform identities and Integrity Metrics can be proven reliably to previously unknown parties. – Secure online discovery of platforms and services: confidence in the information about the software environment and identity of a remote party, enabling higher levels of trust when interacting with this party.

Editor's Notes

  • #11: We’ll come back to Conformance and Certification later
  • #24: Just TPM + protected storage + crypto functionality (SC)
  • #25: TPM + boot chain + “OS” Protection against hacker scripts S/w state integrity verification
  • #26: (Middle term solution plus some infrastructure support, whether restricted to a corporation or extended across organization boundaries) TPM + Boot chain + OS + certificate infrastructure (e.g. PKI) Use of TCPA functionality in consumer + e-services world
  • #27: We’ll come back to Conformance and Certification later
  翻译: