140 likes | 293 Views
TCPA T rusted C omputing P latform A lliance. Saurabh Phansalkar. Key Topics. Need Implementation Predecessor Possible Applications Palladium / DRM Concerns/ Misconceptions Additional Information Sources. Need for TCPA. Internet Threat Trends
E N D
TCPATrustedComputingPlatformAlliance Saurabh Phansalkar
Key Topics • Need • Implementation • Predecessor • Possible Applications • Palladium / DRM • Concerns/ Misconceptions • Additional Information Sources
Need for TCPA Internet Threat Trends • Network attacks – better encryption techniques • Server attacks – firewalls, intrusion detection • Attacks through client PCs Effects • E-business scope limited by lack of security/ trust Source: IBM Watson Research - Global Security Analysis Lab http://www.research.ibm.com/gsal/tcpa/
Need for TCPA Solution • Client based security system • Combination of HW & SW
TCP - Alliance • Initiated by Intel • Formed by Intel, IBM, HP, Compaq, Microsoft • Nearly 200 member companies • Industry work group focused on enhancing trust by increasing security Source: http://www.trustedcomputing.org
Mission Through the collaboration of HW, SW, communications, and technology vendors, drive and implement TCPA specifications for an enhanced HW and OS based trusted computing platform that implements trust into client, server, networking, and communication platforms Source: http://www.trustedcomputing.org
Implementation “Fritz” Chip • Smart card chip • Mounted on LPC bus using I/O mapped registers • Generates RSA public/private key pair • Supported by client security software Source: http://www.trustedcomputing.org http://www.ibm.com
Implementation Functional groups within “Fritz” chip • Public key functions Generation of a RSA public/ private key pair, verification of signatures, encryption & decryption • Trusted boot functions Stores OS configuration information throughout the boot sequence in Platform Configuration Registers (PCR) • Initialization & management functions On & off control of the fritz chip, reset chip Source: http://www.trustedcomputing.org http://www.research.ibm.com/gsal/tcpa/
Predecessor • Embedded Security System (ESS) • Offered by IBM for ThinkPad and NetVista • Smart card chip placed on mother board • Supported by client based software Source: http://www.ibm.com
Applications Business 2 Environment • Issues with authentication systems such as passwds, viruses/ trojans impose limitations on trust • TCPA with biometrics/ smart cards provides 2-factor authentication • “Integrity Metrics” used to determine trustworthiness Source: http://www.trustedcomputing.org http://www.research.ibm.com/gsal/tcpa/
Palladium • Project at Microsoft to add trust in Windows • Embedded in future Windows-OS • Supported by SCP chip • SCP would support Linux • Unclear about compatibility with TCPA chip • “Trusted Operating Root Architecture” will stop “Break Once Run Anywhere” (TORA-BORA) Source: http://www.cl.cam.ac.uk/~rja14/tcpa-faq.html http://www.research.ibm.com/gsal/tcpa/
Digital Rights Management- DRM • Copy protection of music/ video data • Need palladium platform • What will happen for a Disney VCD?? Unique Integrity Metrics, CD Identification Disney Server Source: http://www.cl.cam.ac.uk/~rja14/tcpa-faq.html http://www.research.ibm.com/gsal/tcpa/
Concerns & Misconceptions • Allows vendor to set rules • Piracy threatened • Allows excess control over PCs • TCPA/ Palladium/ DRM are not the same • TCPA is a subset of palladium • DRM is one possible application of combined HW & SW • TCPA does not control execution but it provides protection of private keys and encrypted data
Additional Information • http://www.trustedcomputing.org • http://www.research.ibm.com/gsal/tcpa • http://www.cl.cam.ac.uk/~rja14/tcpa-faq.html • Founder company’s website • http://antitcpa.alsherok.net • http://www.cs.umd.edu/~waa/tcpa