24
1 CS CS - - 6910: Advanced Computer and 6910: Advanced Computer and Information Security (ACIS) Information Security (ACIS) Trusted Computing Group Trusted Computing Group By By Subhashini Subhashini Pulimamidi Pulimamidi Department of Computer Science Department of Computer Science Western Michigan University Western Michigan University Instructor: Prof. Instructor: Prof. Leszek Leszek T. T. Lilien Lilien

CS-6910: Advanced Computer and Information Security (ACIS ... › ~llilien › teaching › fall2006 › cs...Subhashini Pulimamidi Department of Computer Science Western Michigan

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: CS-6910: Advanced Computer and Information Security (ACIS ... › ~llilien › teaching › fall2006 › cs...Subhashini Pulimamidi Department of Computer Science Western Michigan

1

CSCS-- 6910: Advanced Computer and 6910: Advanced Computer and

Information Security (ACIS)Information Security (ACIS)

Trusted Computing GroupTrusted Computing Group

ByBy

SubhashiniSubhashini PulimamidiPulimamidi

Department of Computer ScienceDepartment of Computer Science

Western Michigan UniversityWestern Michigan University

Instructor: Prof. Instructor: Prof. LeszekLeszek T. T. LilienLilien

Page 2: CS-6910: Advanced Computer and Information Security (ACIS ... › ~llilien › teaching › fall2006 › cs...Subhashini Pulimamidi Department of Computer Science Western Michigan

2

What is TCG ?What is TCG ?

�� Trusted Computing Group (TCG) is an industry Trusted Computing Group (TCG) is an industry standards organization with the aim of standards organization with the aim of enhancing the security and trustworthiness of enhancing the security and trustworthiness of the computing environment in disparate the computing environment in disparate computer platforms.computer platforms.

�� The main component of the TCG proposal is The main component of the TCG proposal is the Trusted Platform Module (TPM) which the Trusted Platform Module (TPM) which provides cryptographic functions.provides cryptographic functions.

Page 3: CS-6910: Advanced Computer and Information Security (ACIS ... › ~llilien › teaching › fall2006 › cs...Subhashini Pulimamidi Department of Computer Science Western Michigan

3

GoalGoal

� The Trusted Computing Group (TCG) publishes specifications defining architectures, functions and interfaces that provide a baseline for a wide variety of computing platform implementations.

� Additionally, the TCG publishes specifications describing specific platform implementations such as the Personal Computer, Personal Digital Assistants (PDA), Cellular telephones and other computing equipment.

Page 4: CS-6910: Advanced Computer and Information Security (ACIS ... › ~llilien › teaching › fall2006 › cs...Subhashini Pulimamidi Department of Computer Science Western Michigan

4

ContdContd……

� Platforms based on the TCG specifications are expected to meet functional and reliability standards that allow increased assurance of trust.

� The TCG will publish evaluation criteria and platform specific profiles that may be used as a common yard stick for evaluating devices incorporating TCG technology.

Page 5: CS-6910: Advanced Computer and Information Security (ACIS ... › ~llilien › teaching › fall2006 › cs...Subhashini Pulimamidi Department of Computer Science Western Michigan

5

TCG ArchitectureTCG Architecture

Page 6: CS-6910: Advanced Computer and Information Security (ACIS ... › ~llilien › teaching › fall2006 › cs...Subhashini Pulimamidi Department of Computer Science Western Michigan

6

Trusted Platform FeaturesTrusted Platform Features

Trust is the expectation that a device will Trust is the expectation that a device will

behave in a particular manner for a specific behave in a particular manner for a specific

purpose.purpose.

A trusted platform should provide at least A trusted platform should provide at least

three basic features.three basic features.

1.1. Protected CapabilitiesProtected Capabilities

2.2. Integrity MeasurementIntegrity Measurement

3.3. Integrity ReportingIntegrity Reporting

Page 7: CS-6910: Advanced Computer and Information Security (ACIS ... › ~llilien › teaching › fall2006 › cs...Subhashini Pulimamidi Department of Computer Science Western Michigan

7

Protected CapabilitiesProtected Capabilities

�� Protected capabilities are a set of commands Protected capabilities are a set of commands

with exclusive permission to access shielded with exclusive permission to access shielded

locations.locations.

�� The TPM (Trusted Platform Module) The TPM (Trusted Platform Module)

implements protected capabilities and shielded implements protected capabilities and shielded

locations used to protect and report integrity locations used to protect and report integrity

measurements.measurements.

�� The TPM also stores cryptographic keys used to The TPM also stores cryptographic keys used to

authenticate reported measurements.authenticate reported measurements.

Page 8: CS-6910: Advanced Computer and Information Security (ACIS ... › ~llilien › teaching › fall2006 › cs...Subhashini Pulimamidi Department of Computer Science Western Michigan

8

AttestationAttestation

� Attestation is the process of vouching for the accuracy of information. External entities can attest to shielded locations, protected capabilities, and Roots of Trust.

� A platform can attest to its description of platform characteristics that affect the integrity (trustworthiness) of a platform.

� All forms of attestation require reliable evidence of the attesting entity.

Page 9: CS-6910: Advanced Computer and Information Security (ACIS ... › ~llilien › teaching › fall2006 › cs...Subhashini Pulimamidi Department of Computer Science Western Michigan

9

Integrity Measurement, Storage and Integrity Measurement, Storage and

ReportingReporting

� Integrity Measurement is the process of

obtaining metrics of platform characteristics that

affect the integrity (trustworthiness) of a

platform , storing those metrics; and putting

digests of those metrics in PCRs (Platform

Configuration Registers).

� The starting point of measurement is called the

root of trust for measurement.

Page 10: CS-6910: Advanced Computer and Information Security (ACIS ... › ~llilien › teaching › fall2006 › cs...Subhashini Pulimamidi Department of Computer Science Western Michigan

10

ContdContd……

�� An intermediate step between integrity An intermediate step between integrity

measurement and integrity reporting is called measurement and integrity reporting is called

integrity storageintegrity storage..

�� In this step integrity metrics are stored in a log In this step integrity metrics are stored in a log

and digests of those metrics are stored in and digests of those metrics are stored in PCRPCR’’ss

(Platform Configuration Registers).(Platform Configuration Registers).

�� Integrity ReportingIntegrity Reporting is the process of attesting to is the process of attesting to

the contents of integrity storage.the contents of integrity storage.

Page 11: CS-6910: Advanced Computer and Information Security (ACIS ... › ~llilien › teaching › fall2006 › cs...Subhashini Pulimamidi Department of Computer Science Western Michigan

11

TPM ArchitectureTPM Architecture

Page 12: CS-6910: Advanced Computer and Information Security (ACIS ... › ~llilien › teaching › fall2006 › cs...Subhashini Pulimamidi Department of Computer Science Western Michigan

12

TPM ComponentsTPM Components

�� Input/outputInput/output (I/O) (I/O) manages information flow

over the communications bus.

� It performs protocol encoding/decoding

suitable for communication over external and

internal buses.

� It routes messages to appropriate components.

Page 13: CS-6910: Advanced Computer and Information Security (ACIS ... › ~llilien › teaching › fall2006 › cs...Subhashini Pulimamidi Department of Computer Science Western Michigan

13

ContdContd……

� Non-volatile storage is used to store Endorsement Key (EK), Storage Root Key (SRK), owner authorization data and persistent flags.

� Attestation Identity Keys must be persistent, but it is recommended that AIK keys be stored as Blobs in persistent external storage (outside the TPM), rather than stored permanently inside TPM non-volatile storage.

Page 14: CS-6910: Advanced Computer and Information Security (ACIS ... › ~llilien › teaching › fall2006 › cs...Subhashini Pulimamidi Department of Computer Science Western Michigan

14

ContdContd……

� Program code contains firmware for measuring

platform devices.

� Logically, this is the Core Root of Trust for

Measurement (CRTM). Ideally, the CRTM is

contained in the TPM, but implementation

decisions may require it be located in other

firmware.

Page 15: CS-6910: Advanced Computer and Information Security (ACIS ... › ~llilien › teaching › fall2006 › cs...Subhashini Pulimamidi Department of Computer Science Western Michigan

15

ContdContd……

� The TPM contains a true random-bit generator

used to seed random number generation. The

RNG is used for key generation.

� A Sha-1 message digest engine is used for

computing signatures.

Page 16: CS-6910: Advanced Computer and Information Security (ACIS ... › ~llilien › teaching › fall2006 › cs...Subhashini Pulimamidi Department of Computer Science Western Michigan

16

ContdContd……

� The RSA engine is used for signing with signing keys, encryption/decryption with storage keys, and decryption with the EK.

� The Opt-In component implements TCG policy requiring TPM modules are shipped in the state the customer desires.

� This ranges from disabled and deactivated to fully enabled; ready for an owner to take possession.

� The Execution engine runs program code. It performs TPM initialization and measurement taking.

Page 17: CS-6910: Advanced Computer and Information Security (ACIS ... › ~llilien › teaching › fall2006 › cs...Subhashini Pulimamidi Department of Computer Science Western Michigan

17

Trusted PlatformTrusted Platform

�� Roots of trust are the components which have Roots of trust are the components which have

at least the minimum functionality to describe at least the minimum functionality to describe

the platform characteristics the effect the the platform characteristics the effect the

trustworthiness of the platform.trustworthiness of the platform.

�� There are three roots of trust in a trusted There are three roots of trust in a trusted

platform which are RTM, RTS and RTR.platform which are RTM, RTS and RTR.

Page 18: CS-6910: Advanced Computer and Information Security (ACIS ... › ~llilien › teaching › fall2006 › cs...Subhashini Pulimamidi Department of Computer Science Western Michigan

18

ContdContd……

�� Root of trust for measurement (RTM) Root of trust for measurement (RTM) is a computing engine capable of making inherently reliable integrity measurements.

� Root of trust for storage (RTS) is a computing engine capable of maintaining an accurate summary of values of integrity digests and the sequence of digests.

� Root of trust for reporting (RTR) is a computing engine capable of reliably reporting information held by the RTS.

Page 19: CS-6910: Advanced Computer and Information Security (ACIS ... › ~llilien › teaching › fall2006 › cs...Subhashini Pulimamidi Department of Computer Science Western Michigan

19

Integrity Reporting ProtocolIntegrity Reporting Protocol

Page 20: CS-6910: Advanced Computer and Information Security (ACIS ... › ~llilien › teaching › fall2006 › cs...Subhashini Pulimamidi Department of Computer Science Western Michigan

20

ContdContd……

Attestation protocol consists of several steps:

1. A Challenger requests one or more PCR values

from a platform.

2. An agent on the platform containing a TPM,

collects SML entries.

3. The Platform Agent receives PCR values from

the TPM.

Page 21: CS-6910: Advanced Computer and Information Security (ACIS ... › ~llilien › teaching › fall2006 › cs...Subhashini Pulimamidi Department of Computer Science Western Michigan

21

ContdContd……

4. The TPM signs PCR values using an AIK.

5. The Platform Agent collects credentials that vouch for the TPM. The signed PCR value, SML entries and Credentials are returned to the Challenger.

6. The Challenger verifies the request. The measurement digest is computed and compared with PCR value. The platform credentials are evaluated and signatures checked.

Page 22: CS-6910: Advanced Computer and Information Security (ACIS ... › ~llilien › teaching › fall2006 › cs...Subhashini Pulimamidi Department of Computer Science Western Michigan

22

TCG Usage ScenariosTCG Usage Scenarios

�� Risk ManagementRisk Management

�� Asset ManagementAsset Management

�� EE--commercecommerce

�� Security Monitoring and Emergency ResponseSecurity Monitoring and Emergency Response

Page 23: CS-6910: Advanced Computer and Information Security (ACIS ... › ~llilien › teaching › fall2006 › cs...Subhashini Pulimamidi Department of Computer Science Western Michigan

23

Conclusions for Conclusions for OPPNetsOPPNets

�� If the nodes of If the nodes of oppnetsoppnets are TCG compliant are TCG compliant

then the trustworthiness of those platforms then the trustworthiness of those platforms

increases.increases.

Page 24: CS-6910: Advanced Computer and Information Security (ACIS ... › ~llilien › teaching › fall2006 › cs...Subhashini Pulimamidi Department of Computer Science Western Michigan

24

ReferencesReferences

�� TCG specification architecture overviewTCG specification architecture overview

� Ahmad-Reza Sadeghi, Marcel Selhorst, Christian St ¨uble, Christian

Wachsmann, and Marcel Winandy. TCG inside?- A note on TPM

specification compliance.

http://delivery.acm.org.libproxy.library.wmich.edu/10.1145/1180000/11794

87/p47sadeghi.pdf?key1=1179487&key2=6009363611&coll=portal&dl=AC

M&CFID=6237415&CFTOKEN=27623902