东北大学:《可信计算基础》课程教学资源(PPT课件讲稿)第6章 TPM核心功能(主讲:周福才)

第6章TPM核心功能永学 6.1TPM架构 6.2安全度量和报告 6.3远程证明 数据保护 5TPM密钥管
第6章 TPM核心功能 6.1 TPM架构 6.2 安全度量和报告 6.3 远程证明 6.4 数据保护 6.5 TPM密钥管理

1TPM架构 ⌒录 3大子 Smn nOrtheastern University TPM至少需要具备四个 主要功能:对称非对称 加密、安全存储、完整 TPM 操作系统 性度量和签名认证。数 非易失性 执行引擎 程序代码 储存 据的非对称加密和签名 可选状态配置 认证是通过RSA算法来「惠失性 实现的,而完整性度量 SHA1协处理器 则是通过高效的SHA1 随机数生成器 平台配置 RSA RSA 散列算法来完成,对称|处器|密钙生成 AIK 加密可以使用任意算法 既可以使用专用协处 理器也可以使用软件来 完成。三
6.1 TPM 架构 TPM至少需要具备四个 主要功能:对称/非对称 加密、安全存储、完整 性度量和签名认证。数 据的非对称加密和签名 认证是通过RSA算法来 实现的,而完整性度量 则是通过高效的SHA-1 散列算法来完成,对称 加密可以使用任意算法 ,既可以使用专用协处 理器也可以使用软件来 完成

1TPM架构 ⌒录 3大子 Northeastern University 口非易失性存储(N。 n-Volatile Storage) 口平台配置寄存器PCR 口身份认证密钥(Ates Platform Program Confiquration Identity 口程序代码( Program〔 Register(PCR) Key (AlK Communications 口随机数生成器RNG 口SHA-1引擎 Random Number Engine Generation Engine/Optin//Exec SHA-1 Key RSA Engine 口密钥生成( Key Gen,) Generator Trusted Platform Module(TPM) 口可选状态配置(opt-in) 口执行引擎( Exec engine) 口输入输出I/0
6.1 TPM 架构 非易失性存储(Non-Volatile Storage) 平台配置寄存器PCR 身份认证密钥(Attes. Id. K.) 程序代码(Program Code) 随机数生成器RNG SHA-1引擎 密钥生成(Key Gen.) 可选状态配置(Opt-in) 执行引擎(Exec engine) 输入输出I/O

1TPM架构 ⌒录 3大子 Smn nOrtheastern University ●Non- olatile Storage Non-volatile storage is used to store Endorsement Key(EK), Storage Root Key (SRK),owner authorization data and persistent flags 非易失存储器:EK(2048bi)、EK证书、SRK(2048b)及 所有者( Owner)授权数据(160b)等 O Attestation ldentity Keys(Alk attestation Identity Keys must be persistent, but it is recommended that alk keys be stored as blobs in persistent external storage(outside the TpM rather than stored permanently inside TPM non-volatile storage. 专用于对TPM产生的数据(如TPM功能、PCR寄存器的值 等)进行签名的不可迁移的密钥,由TPM所有者生成
6.1 TPM 架构 ⚫ Non-Volatile Storage ❖ Non-volatile storage is used to store Endorsement Key (EK), Storage Root Key (SRK), owner authorization data and persistent flags. 非易失存储器:EK(2048bit)、 EK证书、SRK(2048bit)及 所有者(Owner)授权数据(160bit)等 ⚫ Attestation Identity Keys (AIK) ❖ Attestation Identity Keys must be persistent, but it is recommended that AIK keys be stored as Blobs in persistent external storage (outside the TPM), rather than stored permanently inside TPM non-volatile storage. 专用于对TPM产生的数据(如TPM功能、PCR寄存器的值 等)进行签名的不可迁移的密钥,由TPM所有者生成

1TPM架构 ⌒录 3大子 Northeastern University ●|O 冷 Protocol en-/decoding Enforce access policies associated with opt-in or other tpm functions ● Program Code Program code contains firmware for measuring platform devices. Logically, this is the Core Root of Trust for Measurement (CRTM 程序代码包含测量平台设备的固件。从逻辑上讲,这是 对可信核心根(cRTM)的测量
6.1 TPM 架构 ⚫ I/O ❖ Protocol en-/decoding ❖ Enforce access policies associated with Opt-in or other TPM functions ⚫ Program Code ❖ Program code contains firmware for measuring platform devices. Logically, this is the Core Root of Trust for Measurement (CRTM). 程序代码包含测量平台设备的固件。从逻辑上讲,这是 对可信核心根(CRTM)的测量

1TPM架构 ⌒录 3大子 Smn nOrtheastern University O Random Number Generator(RNG) RNG is the source of randomness in the TPM % The TPM uses these random values for nonce sy key generation and randomness in signatures allows implementation of a Pseudo random Number Generator( PRNG)algorithm .o the rnG output may or may not be shielded data (by the TPM or by external caller
6.1 TPM 架构 ⚫ Random Number Generator (RNG) ❖ RNG is the source of randomness in the TPM ❖ The TPM uses these random values for nonces, key generation and randomness in signatures. ❖ allows implementation of a Pseudo Random Number Generator (PRNG) algorithm ❖ The RNG output may or may not be shielded data (by the TPM or by external caller)

1TPM架构 ⌒录 3大子 Smn nOrtheastern University ●SHA-1 Engine A SHa-1 message digest engine is used for com puting signatures, creating key blobs and for general purpose use. ● HMAC engine i Computes the HMac digest auth Digest resulting from a secret and arbitrary data auth Digeste-HMAC(secret, data) Mainly used in TPMs authentication protocols provides two pieces of information to the TPM: proof of knowledge of the authorization data and proof that the request arriving is authorized and has no modifications made to the command in transit See OSAP/OlAP protocols
6.1 TPM 架构 ⚫ SHA-1 Engine ❖ A SHA-1 message digest engine is used for computing signatures, creating key Blobs and for general purpose use. ⚫ HMAC engine ❖ Computes the HMAC digest authDigest resulting from a secret and arbitrary data ➢authDigest←HMAC( secret, data) ❖ Mainly used in TPM’s authentication protocols ➢provides two pieces of information to the TPM: proof of knowledge of the authorization data and proof that the request arriving is authorized and has no modifications made to the command in transit. ➢See OSAP/OIAP protocols

1TPM架构 ⌒录 3大子 Smn nOrtheastern University ● RSA Key Generation tcG standardizes the rsa algorithm for use in TPM modules. Its recent release into the public domain makes it a good candidate for TCG. the RSa key generation engine is use to create signing keys and storage keys ● RSA Engine the rsa engine is used for signing with signing keys, encryption/decryption with storage keys, and decryption with the EK
6.1 TPM 架构 ⚫ RSA Key Generation ❖ TCG standardizes the RSA algorithm for use in TPM modules. Its recent release into the public domain makes it a good candidate for TCG. The RSA key generation engine is use to create signing keys and storage keys. ⚫ RSA Engine ❖ The RSA engine is used for signing with signing keys, encryption/decryption with storage keys, and decryption with the EK

1TPM架构 ⌒录 3大子 Smn nOrtheastern University ● Execution Engine the execution engine runs program code. It performs TPM initialization and measurement taking. o Platform Configuration Registers (PCR) .a Pcr is a 160-bit/20-byte storage location which is used to store integrity measurements Whether a PCR must be used to store a specific measurement(e.g. the CrTM, BlOS.Option ROM code., or, whether it is available for general use, is specified in platform specific specifications
6.1 TPM 架构 ⚫ Execution Engine ❖ The execution engine runs program code. It performs TPM initialization and measurement taking. ⚫ Platform Configuration Registers (PCR) ❖ A PCR is a 160-bit/20-byte storage location which is used to store integrity measurements. ❖ Whether a PCR must be used to store a specific measurement (e.g. the CRTM, BIOS…Option ROM code…), or, whether it is available for general use, is specified in platform specific specifications

1TPM架构 ⌒录 3大子 Smn nOrtheastern University Central Processing Unit (CPU) raphi Graphics and Memory Controller Controller HUB(GMCH System Memory Chipset(Northbridge Hard Disks Interface Controller USB Devices HUB (ICH Expansion Cards Chipset(Southbridge Network Interface Low Pin Count(LPC)Bus System BIOS TPM Floppy Drive Parallel 1/o Super 1/0 PS/2 (Legacy Devices) Serial l/o TPM Integration into Pc - Hardware
6.1 TPM 架构
按次数下载不扣除下载券;
注册用户24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
- 媒体服务(PPT课件讲稿)Media Services.ppt
- 河南中医药大学(河南中医学院):《计算机网络》课程教学资源(PPT课件讲稿)第六章 应用层.pptx
- 中国科学技术大学:《计算机体系结构》课程教学资源(PPT课件讲稿)第6章 Data-Level Parallelism in Vector, SIMD, and GPU Architectures.ppt
- 南京大学:《编译原理》课程教学资源(PPT课件讲稿)第七章 运行时刻环境.ppt
- 《高级人工智能 Advanced Artificial Intelligence》教学资源(PPT讲稿)Lecture 7 Recurrent Neural Network.pptx
- 西安交通大学:《网络与信息安全》课程PPT教学课件(网络入侵与防范)第六章 网络入侵与防范——拒绝服务攻击与防御技术.ppt
- 西安电子科技大学:《计算机通信网》课程教学资源(PPT课件讲稿)第1章 概述(宋锐).ppt
- 中国科学技术大学:《嵌入式操作系统 Embedded Operating Systems》课程教学资源(PPT课件讲稿)第四讲 CPU调度(part II).ppt
- 大数据集成(PPT讲稿)Big Data Integration.pptx
- 《计算机文化基础》课程教学资源(PPT课件讲稿)第七章 计算机网络基础.ppt
- 《计算机应用基础》课程教学资源(PPT课件讲稿)第四章 电子表格软件(Excel 2003).ppt
- 四川大学:《操作系统 Operating System》课程教学资源(PPT课件讲稿)Chapter 3 Process Description and Control 3.1 What is a Process 3.2 Process States 3.3 Process Description.ppt
- 哈尔滨工业大学:《语言信息处理》课程教学资源(PPT课件讲稿)机器翻译 II Machine Translation II.ppt
- Gas Systems Modeling andSimulation with MSC.EASY5:GD Advanced Class Notes(EAS105 Course Notes).ppt
- 《计算机网络 Computer Networking》课程教学资源(PPT课件讲稿,英文版)Chapter 6 Wireless and Mobile Networks.ppt
- 《图像处理与计算机视觉 Image Processing and Computer Vision》课程教学资源(PPT课件讲稿)Chapter 08 Stereo vision.pptx
- 《计算机文化基础》课程教学大纲 Computer Culture Foundation.pdf
- 《高级语言程序设计》课程教学资源(试卷习题)试题五(无答案).doc
- 大连工业大学:《计算机程序设计(C语言版)》课程教学资源(PPT课件讲稿,共十三章).pps
- 《Visual Basic 6.0程序设计》课程教学资源(PPT课件)第四章 常用控件与窗体.ppt
- 山东大学:《人机交互技术》课程教学资源(PPT课件讲稿)第3章 交互设备 3.5 显示设备 3.6 语音交互设备 3.7虚拟现实系统中的交互设备.ppt
- 《网络搜索和挖掘关键技术 Web Search and Mining》课程教学资源(PPT讲稿)Lecture 11 Probabilistic Information Retrieval.ppt
- 广西医科大学:《计算机网络 Computer Networking》课程教学资源(PPT课件讲稿)Chapter 01 Introduction overview.pptx
- 东南大学:《C++语言程序设计》课程教学资源(PPT课件讲稿)Chapter 10 Classes A Deeper Look(Part 2).ppt
- 《网上开店实务》课程教学资源(PPT讲稿)学习情境1 网上开店创业策划.ppt
- 安徽理工大学:《Linux开发基础 Development Foundation on Linux OS》课程资源(PPT课件讲稿)Section 4 Perl programming(赵宝).ppt
- 香港理工大学:Artificial Neural Networks for Data Mining.ppt
- 《TCP/IP协议及其应用》课程教学资源(PPT课件)第1章 TCP/IP协议基础.ppt
- 清华大学:《高级计算机网络 Advanced Computer Network》课程教学资源(PPT课件讲稿)Lecture 1 Introduction.pptx
- 香港浸会大学:C++ as a Better C; Introducing Object Technology.ppt
- 大庆职业学院:《计算机网络技术基础》课程教学资源(PPT课件讲稿)第2章 数据通信的基础知识.ppt
- The Art of Function Design -Measure and RKHS.ppt
- 《计算机网络与因特网》课程教学资源(PPT课件)Part VII 广域网(简称WAN), 路由, 和最短路径.ppt
- 三维计算机视觉 3D computer vision(基于卡尔曼滤波的运动结构).pptx
- 河南中医药大学(河南中医学院):《计算机文化》课程教学资源(PPT课件讲稿)第七章 数据库技术(主讲:王哲).pptx
- 《单片机原理及应用》课程教学资源(PPT课件讲稿)第14章 单片机应用系统抗干扰与可靠性设计.ppt
- 北京航空航天大学:《数据挖掘——概念和技术(Data Mining - Concepts and Techniques)》课程教学资源(PPT课件讲稿)Chapter 01 Introduction.ppt
- 《单片机应用系统设计技术》课程教学资源(PPT课件讲稿)第7章 单片机外部扩展资源及应用.ppt
- 香港浸会大学:MPI - Communicators(PPT讲稿).ppt
- 电子工业出版社:《计算机网络》课程教学资源(第五版,PPT课件讲稿)第九章 无线网络.ppt