formal.pdf (806.57 kB)

Formal analysis of a TPM-based secrets distribution and storage scheme

Download (806.57 kB)
conference contribution
posted on 17.12.2009, 12:28 by Ronald Toegl, Georg Hofferek, Karin Greimel, Adrian Leung, Raphael C.-W. Phan, Roderick Bloem
Trusted computing introduces the Trusted Platform Module (TPM) as a root of trust on an otherwise untrusted computer. The TPM can be used to restrict the use of cryptographic keys to trusted states, i.e., to situations in which the computer runs trusted software. This allows for the distribution of intellectual property or secrets to a remote party with a reasonable security that such secrets will not be obtained by a malicious or compromised client. We model a specific protocol for the distribution of secrets proposed by Sevine et al. A formal analysis using the NuSMV model checker shows that the protocol allows an intruder to give the client an arbitrary secret, without the client noticing. We propose an alternative that prevents this scenario.

History

School

  • Mechanical, Electrical and Manufacturing Engineering

Citation

TOEGL, R....et al., 2008. Formal analysis of a TPM-based secrets distribution and storage scheme. IN: 9th International Conference for Young Computer Scientists, (ICYCS 2008), Hunan, China, 18-21 Nov., pp. 2289 - 2294

Publisher

© IEEE

Version

VoR (Version of Record)

Publication date

2008

Notes

This is a conference paper [© IEEE]. It is also available at: http://ieeexplore.ieee.org/ Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.

ISBN

9780769533988

Language

en

Exports

Logo branding

Exports