Trusted Platform Module

Trusted Platform Module

In computing, Trusted Platform Module (TPM) is both the name of a published specification detailing a secure cryptoprocessor that can store cryptographic keys that protect information, as well as the general name of implementations of that specification, often called the "TPM chip" or "TPM Security Device" (as designated in certain Dell BIOS settings [cite web
url = http://support.dell.com/support/edocs/systems/opgx620/en/ug/advfeat0.htm
title = Dell™ OptiPlex™ GX620 User's Guide
date=2008
accessdate = 2008-06-28
publisher = Dell
] ). Calling TPM a "chip" however is a bit of a misnomer since it's a specification for the software written to firmware on chips as opposed to a physical object on a circuit board.Fact|date=September 2008 It was dubbed the "Fritz chip" by professor Ross Anderson, Security Engineering Professor at the University of Cambridge Computer Laboratory, in reference to the former United States Senator Ernest "Fritz" Hollings, who according to Anderson "worked tirelessly in Congress to make TC a mandatory part of all consumer electronics." [cite web
url = http://www.cl.cam.ac.uk/~rja14/tcpa-faq.html
title = Trusted Computing FAQ
first = Ross
last = Anderson
date=2003-08
accessdate = 2008-06-28
publisher = Cambridge University
] The TPM specification is the work of the Trusted Computing Group. The current version of the TPM specification is 1.2 Revision 103, published on July 9 2007. [cite web
url=https://www.trustedcomputinggroup.org/specs/TPM/
title=Trusted Platform Module (TPM) Specifications
publisher=Trusted Computing Group
]

Overview

The Trusted Platform Module offers facilities for the secure generation of cryptographic keys, and limitation of their use, in addition to a hardware pseudo-random number generator. It also includes capabilities such as remote attestation and sealed storage. "Remote attestation" creates a nearly unforgeable hash key summary of the hardware and software configuration. The extent of the summary of the software is decided by the program encrypting the data . This allows a third party to verify that the software has not been changed. "Sealing" encrypts data in such a way that it may be decrypted only if the TPM releases the associated decryption key, which it only does for software that can provide the same password that was supplied when software "ownership" of the TPM was initially configured. [cite web|url=http://msdn.microsoft.com/en-us/library/aa376479(VS.85).aspx|title=TakeOwnership Method of the Win32_Tpm Class|publisher=Microsoft|accessdate=2008-05-27] "Binding" encrypts data using the TPM endorsement key, a unique RSA key burned into the chip during its production, or another trusted key descended from it.

A Trusted Platform Module can be used to authenticate hardware devices. Since each TPM chip has a unique and secret RSA key burned in as it is produced, it is capable of performing platform authentication. For example, it can be used to verify that a system seeking access is the expected system.

Generally, pushing the security down to the hardware level in conjunction with software provides more protection than a software-only solution that is more easily compromised by an attacker. However even where a TPM is used, the key is still vulnerable while a software application that has obtained it from the TPM is using it to perform encryption/decryption operations, as has been illustrated in the case of a cold boot attack [ [http://secude.com/download/htm/10810/en/White_Paper%3A_Don%27t_Panic_-_Cold_Boot_Reality_Check.pdf Don't Panic - Cold Boot Reality Check] ] .

Uses

Disk encryption

Full disk encryption applications, such as the BitLocker Drive Encryption feature of Microsoft's Windows Vista and Windows Server 2008 operating systems, can use this technology to protect the keys used to encrypt the computer's operating system volume and provide integrity authentication for a trusted boot pathway (i.e. BIOS, boot sector, etc.) A number of third party full disk encryption products also support the TPM chip.

Other uses

Almost any encryption-enabled application can in theory make use of a TPM, including:
*Digital Rights Management
*Software license protection & enforcement
*Password protection

These potential other uses have given rise to privacy concerns. Consequently, to address these concerns, the TPM chip cannot be enabled via software alone - a "physical presence request" operation is required, whereby a human sitting at the computer must acknowledge the request to activate the device via a prompt at BIOS level. [cite web|publisher=Microsoft|url=http://msdn.microsoft.com/en-us/library/aa376478(VS.85).aspx|title=SetPhysicalPresenceRequest Method of the Win32_Tpm Class
accessdate=2008-05-20
] Furthermore, each application that uses the TPM must register a unique passphrase when it takes ownership of the TPM in order to prevent other applications from also making unauthorized use of the TPM while it's enabled. [cite web|url=http://msdn.microsoft.com/en-us/library/aa376479(VS.85).aspx|title=TakeOwnership Method of the Win32_Tpm Class|publisher=Microsoft|accessdate=2008-05-20] Future operating systems are expected to have increased TPM support for additional cryptographic features.

TPM Hardware

Starting in 2006, many new laptop computers have been sold with a Trusted Platform Module chip built-in. In the future, this concept could be co-located on an existing motherboard chip in computers, or any other device where a TPM's facilities could be employed, such as a cell phone. Intel is planning to integrate the TPM capabilities into the southbridge chipset in 2008. [ [https://www.trustedcomputinggroup.org/news/events/pastevents/presentations/GovSec_Presentation_052505.pdf Microsoft PowerPoint - GovSec Presentation_052505_v05.ppt ] ]

Trusted Platform Module microcontrollers are currently produced by:
*Atmel
*Broadcom
*Infineon ( [http://www.infineon.com/tpm Infineon TPM] )
*Intel (via Intel Manageability Engine as iTPM)
* [http://www.sinosun.com.cn/eng/index.asp Sinosun]
*STMicroelectronics
*Winbond

TPM Implementation Brand Names

As a specification that manufacturers follow, (vs a product) manufacturers have their own proprietary implementations that meet the TPM standard.

*Intel= Trusted Execution Technology (Intel® TXT)
*AMD= Presidio (one aspect of AMD Trinity)

ee also

*Cryptography
*Hengzhi chip
*Next-Generation Secure Computing Base
*Trusted Computing

References

External links

* [https://www.trustedcomputinggroup.org/home Trusted Computing Group]
** [https://www.trustedcomputinggroup.org/specs/TPM/ Specifications]
* [http://www.xml-dev.com/blog/index.php?action=viewtopic&id=243 Device Authentication-The answer to attacks launched using stolen passwords?]
* [http://lwn.net/Articles/144681/ LWN: OLS: Linux and trusted computing]
* [http://www.grc.com/sn/SN-099.htm GRC podcast: Trusted Platform Module (TPM)] "(TPM content starts 27 minutes 30 seconds in.)"
* [http://darkside.cometway.com/content.agent?page_name=Article&name=007 TPM Setup (for Mac OS X)]
* [https://www.trustedcomputinggroup.org/news/press/TCG_statement_on_Princeton_Feb_paper_Feb_26.pdf Trusted Computing Group Bulletin on the Security of the Trusted Platform Module (TPM) February 2008]
* [http://www.linuxjournal.com/article/6633 Take Control of TCPA]
* [http://www.cs.dartmouth.edu/~pkilab/sparks/ TPM Reset Attack]
* [http://www.wikipatents.com/7254722.html Trusted platform motherboard having physical presence detection based on activation of power-on-switch]


Wikimedia Foundation. 2010.

Игры ⚽ Нужно сделать НИР?

Look at other dictionaries:

  • Trusted Platform Module — В вычислительной технике, Trusted Platform Module (TPM)  название спецификации, описывающей криптопроцессор, в котором хранятся криптографические ключи для защиты информации, а также обобщенное наименование реализаций указанной спецификации …   Википедия

  • Trusted Platform Module — Das Trusted Platform Module (TPM) ist ein Chip, nach der TCG Spezifikation, die einen Computer oder ähnliche Geräte um grundlegende Sicherheitsfunktionen erweitert. Diese Funktionen können beispielsweise den Zielen des Lizenzschutzes und/oder… …   Deutsch Wikipedia

  • Trusted Platform Module — Composants internes d un Trusted Platform Module Le Trusted Platform Module (également nommé puce TPM ou puce Fritz) est un composant cryptographique matériel, sur lequel s appuie l implémentation au niveau matériel du système NGSCB. Il est… …   Wikipédia en Français

  • Trusted Platform — Dieser Artikel oder Abschnitt bedarf einer Überarbeitung. Näheres ist auf der Diskussionsseite angegeben. Hilf mit, ihn zu verbessern, und entferne anschließend diese Markierung. Trusted Computing (TC) ist eine Technologie, die von der Trusted… …   Deutsch Wikipedia

  • Trusted Computing — (TC) is a technology developed and promoted by the Trusted Computing Group. The term is taken from the field of trusted systems and has a specialized meaning. With Trusted Computing the computer will consistently behave in specific ways, and… …   Wikipedia

  • Trusted Computing Group — Rechtsform Konsortium Gründung 2003[1] Sitz Beaverton (Oregon), USA[2] Website …   Deutsch Wikipedia

  • Trusted Execution Technology — (TET or TXT), formerly known as LaGrande Technology is a key component of Intel s initiative of safer computing . Intel Trusted Execution Technology (Intel TXT) is a hardware extension to some of Intel s microprocessors and respective chipsets,… …   Wikipedia

  • Trusted Computing — (TC) ist eine Technologie, die von der Trusted Computing Group entwickelt und beworben wird. Der Ausdruck ist dem Fachausdruck Trusted System entlehnt, hat jedoch eine eigene Bedeutung. Trusted Computing bedeutet, dass der Betreiber eines PC… …   Deutsch Wikipedia

  • Trusted Computing Platform Alliance — Trusted Computing Group Pour les articles homonymes, voir TCG. Le Trusted Computing Group (TCG, nommé jusqu en 2003 TCPA pour Trusted Computing Platform Alliance) est un consortium d entreprises d informatique (Compaq, HP, IBM, Intel, Microsoft,… …   Wikipédia en Français

  • Trusted Computer System Evaluation Criteria — (TCSEC) is a United States Government Department of Defense (DoD) standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system. The TCSEC was used to evaluate, classify and… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”