A Formal Analysis of Authentication in the TPM
نویسندگان
چکیده
The Trusted Platform Module (TPM) is a hardware chip designed to enable commodity computers to achieve greater levels of security than is possible in software alone. To this end, the TPM provides a way to store cryptographic keys and other sensitive data in its shielded memory. Through its API, one can use those keys to achieve some security goals. There are 300 million TPMs currently in existence, mostly in high-end laptops, but now increasingly in desktops and servers. The TPM specification is an industry standard [11] and an ISO/IEC standard [9] (more than 700 pages) coordinated by the Trusted Computing Group. Several papers have appeared describing systems that leverage the TPM to create secure applications, but most of these assume that the TPM API behaves correctly and provides the high-level security properties required [6, 7]. Lower level analyses of the TPM API also exist and several vulnerabilities in the TPM API have been discovered: offline dictionary attacks on the passwords or ‘authdata’ used to secure access to keys [5], attacks exploiting the fact that the same authdata can be shared between users [4], an attacker can also in some circumstances illegitimately obtain a certificate on a TPM key of his choice [8], . . . These attacks highlight the necessity of formal analysis of the API specification. We perform such an analysis in this work, focusing on the mechanisms for authentication and authorisation.
منابع مشابه
Analysis of Object-Specific Authorization Protocol (OSAP) using Coloured Petri Nets
The use of Trusted Platform Module (TPM) is becoming increasingly popular in many security systems. To access objects protected by TPM (such as cryptographic keys), several cryptographic protocols, such as the Object Specific Authorization Protocol (OSAP), can be used. Given the sensitivity and the importance of those objects protected by TPM, the security of this protocol is vital. Formal meth...
متن کاملGSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...
متن کاملGame-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...
متن کاملEnhancing privacy of recent authentication schemes for low-cost RFID systems
Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...
متن کاملAuthentication of the Command TPM_CertifyKey in the Trusted Platform Module
Trusted Platform Module (TPM) is a key component designed to enable computers achieve greater security. Several vulnerabilities discovered in the TPM highlight the necessity of formal analysis. The procedure invoking an API may be regarded as several interactive processes between the TPM and a user. As a result, the current study formalized the API specifications proposed by Trusted Computing G...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010