Advertisement

The Trusted Platform Module (TPM) and smart card devices have many features in common. Both are low cost, tamper resistant, small footprint devices used to provide the basis of a secure computing environment. This chapter presents an introduction to the security mechanisms provided by the TPM highlighting those not typically found on a smart card. The concept of “ownership” is one of the major differences between the TPM and a smart card and this is described in some detail before concluding with a review of some of the security services uniquely provided by the TPM.

Key words

Smart Cards Trusted Computing TPM Security 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    . B. Balacheff, L. Chen, S. Pearson, D. Plaquin, and G. Proudler, Trusted Computing Platforms: TCPA Technology in Context. Prentice Hall, 2003.Google Scholar
  2. 2.
    C. Mitchell, ed., Trusted Computing. London, UK: IEE Press, 2005.Google Scholar
  3. 3.
    . D. of Defense, “DoD 5200.28-STD: Department of defense trusted computer system evalua-tion criteria”, tech. rep., Department of Defense, 1985.Google Scholar
  4. 4.
    . E. Gallery, “An overview of trusted computing technology”, in Trusted Computing (C. J. Mitchell, ed.), IEE, 2005.Google Scholar
  5. 5.
    E. Gallery and C. J. Mitchell, “Trusted mobile platforms”, in FOSAD ’07, International School on Foundations of Security Analysis and Design, vol. 4677 of LNCS, (Bertinoro, Italy), Springer-Verlag, Sep 2007.Google Scholar
  6. 6.
    FIPS, “Specifications for the Secure Hash Standard”, Tech. Rep. 180-2, Federal Information Processing Standards, National Technical Information Service (NTIS), 5285 Port Royal Road, Springfield, VA 22161, Aug 2002.Google Scholar
  7. 7.
    . H. Krawczyk, M. Bellare, and R. Canetti, “HMAC: Keyed-hashing for message authentica-tion”, RFC 2104, IETF, 1997.Google Scholar
  8. 8.
    . M. Bellare, R. Canetti, and H. Krawczyk, “Keying Hash Functions for Message Authentica-tion”, in Advances in Cryptology - Crypto ’96 (N. Koblitz, ed.), vol. 1109 of Lecture Notes in Computer Science, Springer-Verlag, 1996.Google Scholar
  9. 9.
    R. Anderson, “Cryptography and competition policy: issues with ’trusted computing’”, in PODC ’03: Proceedings of the twenty-second annual symposium on Principles of distributed computing, (New York, NY, USA), pp. 3V10, ACM Press, 2003.Google Scholar
  10. 10.
    . R. J. Anderson, Security Engineering - a Guide to Building Dependable Distributed Systems. Wiley, 2001.Google Scholar
  11. 11.
    . R. L. Rivest, A. Shamir, and L. M. Adelman, “A method for obtaining digital signatures and public-key cryptosystems”, Communications of the ACM, vol. 21, pp. 120V126, 1978. More Information Available via. http://citeseer.ist.psu.edu/rivest78method. htm. Cited on 3rd Oct, 2007
  12. 12.
    . S. Kinney, Trusted Platform Module Basics: Using TPM in Embedded Systems. Elsevier, 2006.Google Scholar
  13. 13.
    . S. Pearson, “Trusted computing platforms, the next security solution”, Technical Report HPL-2002-221, Hewlett-Packard Laboratories, Nov 2002.Google Scholar
  14. 14.
    . S. Pearson. (ed.): “Trusted Computing Platforms: TCPA Technology in Context”, Prentice Hall, 2003.Google Scholar
  15. 15.
    . S. W. Smith, Trusted Computing Platforms: Design and Applications. Springer-Verlag, 2005.Google Scholar
  16. 16.
    TCG, “TCG Specification Architecture Overview”, TCG Specification Revision 1.4, The Trusted Computing Group, Portland, OR, USA, Aug 2007.Google Scholar
  17. 17.
    TCG, “TPM Main, Part 1 Design Principles”, TCG Specification Version 1.2 Revision 103, The Trusted Computing Group, Portland, OR, USA, Jul 2007.Google Scholar
  18. 18.
    TCG, “TPM Main, Part 2 TPM Data Structures”, TCG Specification Version 1.2 Revision 103, The Trusted Computing Group, Portland, OR, USA, Jul 2007.Google Scholar
  19. 19.
    TCG, “TPM Main, Part 3 Commands”, TCG Specification Version 1.2 Revision 103, The Trusted Computing Group, Portland, OR, USA, Jul 2007.Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2008

Authors and Affiliations

  • Allan Tomlinson

There are no affiliations available

Personalised recommendations