The Attestation Mechanism in Trusted Computing. A Simple Remote Attestation Protocol Platform TPM Verifier Application A generates PK A & SK A 2) computes.

Slides:



Advertisements
Similar presentations
Simple and Practical Anonymous Digital Coin Tracing
Advertisements

A Crash Course in Modern Crypto Tools Dan Boneh Stanford University.
1 Key Exchange Solutions Diffie-Hellman Protocol Needham Schroeder Protocol X.509 Certification.
Trusted Platform Module
Vpn-info.com.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Ragib Hasan Johns Hopkins University en Spring 2011 Lecture 3 02/14/2010 Security and Privacy in Cloud Computing.
 Alexandra Constantin  James Cook  Anindya De Computer Science, UC Berkeley.
Analysis of Direct Anonymous Attestation (DAA) Sudip Regmi Ilya Pirkin.
Public Key Management and X.509 Certificates
Analysis of Remote Attestation Lavina Jain, Jayesh Vyas.
Efficient Private Techniques for Verifying Social Proximity Michael J. Freedman and Antonio Nicolosi Discussion by: A. Ziad Hatahet.
IAW 2006 Cascaded Authorization with Anonymous- Signer Aggregate Signatures Danfeng Yao Department of Computer Science Brown University Joint work with.
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
Systems and Internet Infrastructure Security (SIIS) LaboratoryPage Systems and Internet Infrastructure Security Network and Security Research Center Department.
Secret Handshakes from CA-Oblivious Encryption Asiacrypt 2004, Jeju-do, Korea Claude Castelluccia, Stanisław Jarecki, Gene Tsudik UC Irvine.
Public-key based. Public-key Techniques based Protocols –may use either weak or strong passwords –high computation complexity (Slow) –high deployment.
Ragib Hasan Johns Hopkins University en Spring 2010 Lecture 5 03/08/2010 Security and Privacy in Cloud Computing.
Trusted Platform Modules: Building a Trusted Software Stack and Remote Attestation Dane Brandon, Hardeep Uppal CSE551 University of Washington.
An Efficient and Anonymous Buyer- Seller Watermarking Protocol C. L. Lei, P. L. Yu, P. L. Tsai and M. H. Chan, IEEE Transactions on Image Processing, VOL.
Spring 2002CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Proactive Secure Mobile Digital Signatures Work in progress. Ivan Damgård and Gert Læssøe Mikkelsen University of Aarhus.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
Cryptographic Techniques Instructor: Jerry Gao Ph.D. San Jose State University URL: May,
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Public Key Distribution and X.509 Wade Trappe. Distribution of Public Keys There are several techniques proposed for the distribution of public keys:
Computer Science Public Key Management Lecture 5.
Digital Signature Technologies & Applications Ed Jensen Fall 2013.
Trusted Computing BY: Sam Ranjbari Billy J. Garcia.
1 Anonymous Roaming Authentication Protocol with ID-based Signatures Lih-Chyau Wuu Chi-Hsiang Hung Department of Electronic Engineering National Yunlin.
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian.
CS259: Security Analysis of Network Protocols Winter 2008 Project Presentations 2 Day 2 – Feb. 21, 2008.
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
Cosc 4765 Trusted Platform Module. What is TPM The TPM hardware along with its supporting software and firmware provides the platform root of trust. –It.
Q: How do Ole and Lena get a shared private key? 1) Lena  LockmasterE keyLena ( ID Lena || ID Ole ) Example (Suppose Lena wants a key to shared with Ole.)
出處 :2010 2nd International Conference on Signal Processing Systems (ICSPS) 作者 :Zhidong Shen 、 Qiang Tong 演講者 : 碩研資管一甲 吳俊逸.
Fall 2010/Lecture 321 CS 426 (Fall 2010) Key Distribution & Agreement.
1 Introduction The State of the Art in Electronic Payment Systems, IEEE Computer, September 1997.
An Introduction to Trusted Platform Technology Siani Pearson Hewlett Packard Laboratories, UK
WISTP’08 ©LAM /05/2008 A Self-Certified and Sybil-Free Framework for Secure Digital Identity Domain Buildup Christer Andersson Markulf Kohlweiss.
Key Agreement for Heterogeneous Mobile Ad-hoc Groups (µSTR-H) Mark Manulis Horst-Görtz Institute, Bochum (Germany)
The FIDO Approach to Privacy Hannes Tschofenig, ARM Limited 1.
Trusted Infrastructure Xiaolong Wang, Xinming Ou Based on Dr. Andrew Martin’s slides from TIW 2013.
Chapter 4 - X.509 Authentication TE-405 Network Security and Management Fall Dr. Faisal Kakar
Establishing authenticated channels and secure identifiers in ad-hoc networks Authors: B. Sieka and A. D. Kshemkalyani (University of Illinois at Chicago)
Pkiuniversity.com. Alice Bob Honest Abe’s CA Simple PKI hierarchy.
A Simple Traceable Pseudonym Certificate System for RSA-based PKI SCGroup Jinhae Kim.
Chapt. 10 – Key Management Dr. Wayne Summers Department of Computer Science Columbus State University
1 Information Security – Theory vs. Reality , Winter Lecture 12: Trusted computing architecture (cont.), Eran Tromer Slides credit:
EE 122: Lecture 24 (Security) Ion Stoica December 4, 2001.
ICICS2002, Singapore 1 A Group Signature Scheme Committing the Group Toru Nakanishi, Masayuki Tao, and Yuji Sugiyama Dept. of Communication Network Engineering.
Use or disclosure of the contents of this page is restricted by the terms on the notice page Intel Strategy for Post Quantum Crypto Ernie Brickell Presentation.
Manu Drijvers, Joint work with Jan Camenisch, Anja Lehmann. March 9 th, 2016 Universally Composable Direct Anonymous Attestation.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
T Special Course in OS Security (Dan Forsberg) – Two possible steps from integrity-based remote attestation to the next level Property.
29/Jul/2009 Young Hoon Park.  M.Bellare, D.Micciancio, B.Warinschi, Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and.
Computer Security module October 2008 Mark D. Ryan HP Labs, Bristol University of Birmingham Trusted Platform Module (TPM) introduction.
Computer Security module October 2009 Mark D. Ryan University of Birmingham Trusted Platform Module (TPM) introduction.
Security Outline Encryption Algorithms Authentication Protocols
SSL Certificates for Secure Websites
Assignment #7 – Solutions
Antonio Pastor Diego R. López Adrian Shaw
Formal Analysis and Applications of Direct Anonymous Attestation
Presentation transcript:

The Attestation Mechanism in Trusted Computing

A Simple Remote Attestation Protocol Platform TPM Verifier Application A generates PK A & SK A 2) computes hash #A 3) Cert{PK A, #A}SK AIK 4) Cert AIK { PK A, #A}, Cert CA { PK AIK } 6) looks up #A in DB 5) verifies the signatures 7)... PK TPM & SK TPM (Endorsement key) 1) PK A DB #A“ok” PK AIK & SK AIK (Attestation Identity Key)

Privacy Concerns The attestation key could be used to track internet activity and compromise privacy. 1 st solution: trusted third party. 2 nd solution: Direct anonymous attestation. -E. Brickell, J. Camenisch, and L. Chen

DAA - Joining Platform TPM DAA Issuer 2) DAA, Cert CA {PKT PM } 3) Sig Issuer (DAA) PK TPM & SK TPM (Endorsement key) 1) generates DAA key *Sig Issuer (DAA) is (c,e,s) such that c e = a daa b s d mod n key=(a,b,d,n)

DAA – Attestation (1) Platform TPM PK TPM & SK TPM (Endorsement key) DAA key Verifier 4) Sig AIKi {PK A, #A} PK AIKi & SK AIKi (Attestation Identity Keys) 1) Generate AIK i 3) Compute Sig DAA {AIK i, verifier, time} Application A 2) Compute #A

DAA – Attestation (2) Platform TPM PK TPM & SK TPM (Endorsement key) DAA key Verifier 4) Sig AIKi {PK A, #A} PK AIKi & SK AIKi (Attestation Identity Keys) 5) ZKP that establishes that the TPM posesses: Sig Issuer {DAA} and Sig DAA {AIK i, verifier, time} Application A 1) Generate AIK i 3) Compute Sig DAA {AIK i, verifier, time} 2) Compute #A