Key Management with Trusted Platform Modules

نویسنده

  • Mikael Goldmann
چکیده

Key Management with Trusted Platform Modules The concept of Trusted Computing, which aims at making computing platforms more reliable, is based on a chip called Trusted Platform Module (TPM). The TPM is a chip which provides cryptographic functionality like RSA encryption and secure key storage. The aim of the Master’s project was to analyse and implement TPM based pre-boot authentication for the disc encryption software Pointsec for PC. The system was analysed with respect to manageability and security. With regard to manageability the findings were that two critical implementation factors will be interoperability and user transparency. Some TPM features are not standardized which complicates the implementation of a general system. Recovery from password loss or hardware failure can be achieved with Remote help or TPM key backup. The security analysis focused on the software and hardware attack mitigation integrated into the TPM. The chip was found to be somewhat vulnerable to sophisticated laboratory based attacks but fully comparable to smartcards. A prototype using the TPM for RSA key storage and RSA-wrapping of the disc encryption key was developed. The prototype has two parts; one Windows based user installation utility and one pre-boot authentication module. In order to communicate with the TPM in the pre-boot environment a kernel device driver was developed.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

SDOS: Using Trusted Platform Modules for Secure Cryptographic Deletion in the Swift Object Store

The secure deletion of data is becoming increasingly important to individuals, corporations as well as governments. Recent advances in worldwide laws and regulations now require secure deletion for sensitive data in certain industries. Data leaks in the public and private sector are commonplace today, and they often reveal data which was supposed to be deleted. Secure deletion describes any mec...

متن کامل

High Assurance Policy-Based Key Management at Low Cost

Past decade has witnessed the availability of Trusted Platform Modules (TPM) on commodity computers. While the most common use of TPM appears to be BitLocker on Windows OS, server class motherboards have not yet enjoyed a similar TPM deployment base. Recent research and products show that the TPM can provide a level of trust on locally executing software. Nonetheless, TPMs haven’t been utilized...

متن کامل

Augmenting Internet-based Card Not Present Transactions with Trusted Computing

In this paper, we demonstrate how Trusted Computing technology can be used to enhance the security of Internet-based Card Not Present (CNP) transactions. We take a pragmatic approach, focusing here on exploiting features of Trusted Computing as it is being deployed today. Thus we rely only on the presence of client-side Trusted Platform Modules, rather than upon the “idealised” deployment in wh...

متن کامل

Augmenting Internet-Based Card Not Present Transactions with Trusted Computing (Extended Abstract)

In this paper, we demonstrate how Trusted Computing technology can be used to enhance the security of Internet-based Card Not Present (CNP) transactions. We take a pragmatic approach, focusing here on exploiting features of Trusted Computing as it is being deployed today. Thus we rely only on the presence of client-side Trusted Platform Modules, rather than upon the “idealised” deployment in wh...

متن کامل

Trusted Integrity Measurement and Reporting for Virtualized Platforms

Verifiable trust is a desirable property for computing platforms. Current trusted computing systems developed by Trusted Computing Group (TCG) provide verifiable trust by taking immutable snapshots of the whole set of platform components. It is, however, difficult to use this technology directly in virtualized platforms because of complexity and dynamic changes of platform components. In this p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006