Securing the Distribution and Storage of Secrets with Trusted Platform Modules

نویسندگان

  • Paul E. Sevinç
  • Mario Strasser
  • David A. Basin
چکیده

We present a protocol that allows servers to securely distribute secrets to trusted platforms. The protocol maintains the confidentiality of secrets in the face of eavesdroppers and careless users. Given an ideal (tamper-proof) trusted platform, the protocol can even withstand attacks by dishonest users. As an example of its use, we present an application to secure document processing.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

SDOS: Using Trusted Platform Modules for Secure Cryptographic Deletion in the Swift Object Store

The secure deletion of data is becoming increasingly important to individuals, corporations as well as governments. Recent advances in worldwide laws and regulations now require secure deletion for sensitive data in certain industries. Data leaks in the public and private sector are commonplace today, and they often reveal data which was supposed to be deleted. Secure deletion describes any mec...

متن کامل

cTPM: A Cloud TPM for Cross-Device Trusted Applications

Current Trusted Platform Modules (TPMs) are illsuited for use in mobile services because they hinder sharing data across multiple devices seamlessly, they lack access to a trusted real-time clock, and their nonvolatile storage performs poorly. This paper presents cloud TPM (cTPM), an extension of the TPM’s design to address these problems. cTPM includes two features: 1) a cloud seed shared betw...

متن کامل

On Reliable Platform Configuration Change Reporting Mechanisms for Trusted Computing Enabled Platforms

One of the most important use-cases of Trusted Computing is Remote Attestation. It allows platforms to get a trustworthy proof of the loaded software and current configuration of certain remote platforms, thereby enabling them to make decisions about the remote platforms’ trust status. Common concepts like Internet Protocol security or Transport Layer Security make these decisions based on shar...

متن کامل

Key Management with Trusted Platform Modules

Key Management with Trusted Platform Modules The concept of Trusted Computing, which aims at making computing platforms more reliable, is based on a chip called Trusted Platform Module (TPM). The TPM is a chip which provides cryptographic functionality like RSA encryption and secure key storage. The aim of the Master’s project was to analyse and implement TPM based pre-boot authentication for t...

متن کامل

Leveraging a Minimal Trusted Computing Base for Securing On-Demand MANET Routing Protocols

We propose an approach to secure on-demand mobile ad hoc network (MANET) routing protocols by leveraging low-complexity trustworthy MANET modules (TMM). Such TMMs, which perform some trivial hard-wired functions involving simple logical and hash operations, can be realized at low cost. We describe the functionality of such TMMs to offer a sound trusted computing base (TCB) for securing MANETs. ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007