Trusted Platform Module

From Wikipedia, the free encyclopedia

In computing, Trusted Platform Module (TPM) is both the name of a published specification detailing a microcontroller that can store secured information, as well as the general name of implementations of that specification. The TPM specification is the work of the TPM Work Group, under the auspices of the Trusted Computing Group. The current version of the TPM specification is 1.2 Revision 94, published on March 29, 2006.[1]

Contents

[edit] Overview

A Trusted Platform Module offers facilities for secure generation of cryptographic keys, the abilities to limit the use of keys (to either signing / verification or encryption / decryption), as well as a hardware Random Number Generator. Its three also includes capabilities such as remote attestation, binding, and sealed storage. Remote attestation creates an unforgeable summary of the hardware, boot, and host O/S configuration of a computer, allowing a third party (such as a digital music store) to verify that the software has not been changed. Sealing encrypts data in such a way that it may be decrypted only in the exact same state (that is, it may be decrypted only on the computer it was encrypted running the same software). Binding encrypts data using the TPM's endorsement key (a unique RSA key put in the chip during its production) or another 'trusted' key.

A Trusted Platform Module can be used to authenticate a hardware device. Since each TPM chip is unique to a particular device, it is capable of performing platform authentication. For example, it can be used to verify that the system seeking the access is the expected system.

[edit] Uses

Microsoft's new desktop operating system Windows Vista uses this technology as part of the feature BitLocker Drive Encryption. Available only in Ultimate and Enterprise editions of Windows Vista, BitLocker will encrypt the computer's boot volume and provide integrity authentication for a trusted boot pathway (i.e. BIOS, boot sector, etc.). Other volumes can be encrypted using built-in command-line tools (although not via the GUI currently). Future Windows versions are expected to have increased TPM and BitLocker support for additional cryptographic features and expanded volume encryption. BitLocker requires two NTFS-formatted drive volumes, one for Windows boot code and BitLocker operational code, and the other containing the boot volume (i.e. the volume where the operating system is stored). It should also be noted that contrary to its official name of BitLocker Drive Encryption, BitLocker only encrypts logical volumes (which may or may not be an entire drive).

The Enforcer is a Linux Security Module designed to improve integrity of a computer running Linux by ensuring no tampering of the file system.[2] It can interact with 'trusted' hardware to provide higher levels of assurance for software and sensitive data. The Enforcer can also work with the TPM to store the secret to an encrypted loopback file system, and unmount this file system when a tampered file is detected; the secret will not be accessible to mount the loopback file system until the machine has been rebooted with untampered files. This allows sensitive data to be protected from an attacker.

Generally, pushing the security down to the hardware level in conjunction with software provides more avenues for protection than a software-only solution that can be compromised by an attacker. Starting in 2006, many new laptop computers have been sold with a Trusted Platform Module chip built-in. In the future, this concept could be co-located on an existing motherboard chip in computers, or any other device where a TPM's facilities could be employed, such as a cell phone. Intel is planning to integrate the TPM capabilites into the southbridge chipset in 2008.[3]

[edit] Trusted Platform Management and Recovery

As businesses deploy Trusted Platforms and begin to use applications with these advanced security features, the management and recovery of these platforms has an additional component that is not covered by traditional management and recovery mechanisms. There is a risk of serious data loss in the event that a TPM security chip or hard drive is corrupted or if a user leaves the organization. For example, organizations may need access to a former employee’s encrypted data or TPM-secured keys for disaster recovery purposes. The archive and recovery of keys protected by the Trusted Platform Module security chip is vital for all businesses and especially those needing to retain access to encrypted data for a predetermined time. Security and data integrity must be maintained while ensuring proper archive procedures and recovery by someone other than the original user. Additionally, transferring data to a replacement PC requires an enterprise-level process for transferring the appropriate TPM-secured application keys.

[edit] TPM microcontroller manufacturers

Trusted Platform Module microcontrollers are produced by:


[edit] See also

[edit] References

  1. ^ Trusted Platform Module (TPM) Specifications. Trusted Computing Group. Retrieved on April 7, 2007.
  2. ^ Enforcer Homepage. Retrieved on April 7, 2007.
  3. ^ https://www.trustedcomputinggroup.org/news/events/pastevents/presentations/GovSec_Presentation_052505.pdf

[edit] External links

In other languages