Font Size: a A A

Security Analysis Of Trusted Platform Module And Application

Posted on:2007-09-20Degree:DoctorType:Dissertation
Country:ChinaCandidate:J ChenFull Text:PDF
GTID:1118360185454177Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
Trusted Platform Module is the core of the trusted computing. The trusted platform needs the TPM's trusted measure ability, trusted storage ability and trusted report ability to attest to user the truth of the platform. Currently, interests mainly focus on the implementation of the TPM and it's application. Few discusses are about the security of the TPM. Because of this, it's hard to convince people of the security of TPM, and it's also hard to use TPM in new security application.In this case, we do research on the security analysis of TPM. The security of TPM is for the purpose of solving the following questions. The first question is whether TPM is secure. The second question is whether there are some improvements in the security of TPM. The third question is how to use TPM in new application. After analyzing security of TPM, we implemented TPM and use the implemented TPM to verity the security analysis of TPM. Finally, two new security applications are developed based on TPM.TPM provides services by its APIs (Application Programming Interface), but the security of these APIs is not mentioned in TCG's specification and not guaranteed by TCG. So, we analyze the security of TPM. Firstly, a formal model of TPM is built using first-order logic language. Then logic reasoning is made on the formal model. Meanwhile, in order to automatically reason, an automatic reasoning program is developed based on artificial intelligence. Through reasoning and analysis, some secure vulnerability is found in the TPM's APIs. Based on the result of reasoning and analysis, some improved suggestions are proposed.The cryptographic protocols of TPM are also the security base of TPM. The analysis is also made on the cryptographic protocols of TPM. Firstly, a formal description of the cryptographic protocols of TPM is made using SVO logic. Then logic reasoning is made on the formal description. Through reasoning and analysis, some secure vulnerabilities are found in the cryptographic protocols of TPM, and repair methods are also proposed.After analyzing the security of TPM, we implemented TPM. In the implementation of TPM, two algorithms are improved. One is key generation. The other is multiplicative inverse of modulo. In the key generation algorithm, a best method of generating key is found through theory analysis and many experiments. In the multiplicative inverse of modulo, a new algorithm is initiated which needs less memory and runs faster than extended Euclid...
Keywords/Search Tags:Trusted Platform Module, Trusted Computing, Security Chip, Security API, Cryptographic protocol, Automatic Reason, Modulo Inverse, Monitor Method, CA (Certificate Authority)
PDF Full Text Request
Related items