- Trusted Platform Module
In
computing , Trusted Platform Module (TPM) is both the name of a publishedspecification detailing asecure cryptoprocessor that can store cryptographic keys that protect information, as well as the general name of implementations of that specification, often called the "TPM chip" or "TPM Security Device" (as designated in certainDell BIOS settings [cite web
url = http://support.dell.com/support/edocs/systems/opgx620/en/ug/advfeat0.htm
title = Dell™ OptiPlex™ GX620 User's Guide
date=2008
accessdate = 2008-06-28
publisher =Dell ] ). Calling TPM a "chip " however is a bit of a misnomer since it's a specification for the software written tofirmware on chips as opposed to a physical object on a circuit board.Fact|date=September 2008 It was dubbed the "Fritz chip" by professor Ross Anderson, Security Engineering Professor at theUniversity of Cambridge Computer Laboratory, in reference to the formerUnited States Senator Ernest "Fritz" Hollings, who according to Anderson "worked tirelessly in Congress to make TC a mandatory part of all consumer electronics." [cite web
url = http://www.cl.cam.ac.uk/~rja14/tcpa-faq.html
title = Trusted Computing FAQ
first = Ross
last = Anderson
date=2003-08
accessdate = 2008-06-28
publisher =Cambridge University ] The TPM specification is the work of theTrusted Computing Group . The current version of the TPM specification is 1.2 Revision 103, published onJuly 9 2007 . [cite web
url=https://www.trustedcomputinggroup.org/specs/TPM/
title=Trusted Platform Module (TPM) Specifications
publisher=Trusted Computing Group]Overview
The Trusted Platform Module offers facilities for the secure generation of cryptographic keys, and limitation of their use, in addition to a
hardware pseudo-random number generator . It also includes capabilities such as remote attestation and sealed storage. "Remote attestation" creates a nearly unforgeable hash key summary of the hardware and software configuration. The extent of the summary of the software is decided by the program encrypting the data . This allows a third party to verify that the software has not been changed. "Sealing" encrypts data in such a way that it may be decrypted only if the TPM releases the associated decryption key, which it only does for software that can provide the same password that was supplied when software "ownership" of the TPM was initially configured. [cite web|url=http://msdn.microsoft.com/en-us/library/aa376479(VS.85).aspx|title=TakeOwnership Method of the Win32_Tpm Class|publisher=Microsoft |accessdate=2008-05-27] "Binding" encrypts data using the TPM endorsement key, a uniqueRSA key burned into the chip during its production, or another trusted key descended from it.A Trusted Platform Module can be used to authenticate hardware devices. Since each TPM chip has a unique and secret
RSA key burned in as it is produced, it is capable of performing platformauthentication . For example, it can be used to verify that a system seeking access is the expected system.Generally, pushing the security down to the hardware level in conjunction with software provides more protection than a software-only solution that is more easily compromised by an attacker. However even where a TPM is used, the key is still vulnerable while a software application that has obtained it from the TPM is using it to perform encryption/decryption operations, as has been illustrated in the case of a
cold boot attack [ [http://secude.com/download/htm/10810/en/White_Paper%3A_Don%27t_Panic_-_Cold_Boot_Reality_Check.pdf Don't Panic - Cold Boot Reality Check] ] .Uses
Disk encryption
Full disk encryption applications, such as theBitLocker Drive Encryption feature ofMicrosoft 'sWindows Vista andWindows Server 2008 operating system s, can use this technology to protect the keys used to encrypt the computer'soperating system volume and provide integrityauthentication for a trusted boot pathway (i.e.BIOS ,boot sector , etc.) A number of third party full disk encryption products also support the TPM chip.Other uses
Almost any encryption-enabled application can in theory make use of a TPM, including:
*Digital Rights Management
*Software license protection & enforcement
*Password protectionThese potential other uses have given rise to
privacy concerns. Consequently, to address these concerns, the TPM chip cannot be enabled via software alone - a "physical presence request" operation is required, whereby a human sitting at the computer must acknowledge the request to activate the device via a prompt atBIOS level. [cite web|publisher=Microsoft |url=http://msdn.microsoft.com/en-us/library/aa376478(VS.85).aspx|title=SetPhysicalPresenceRequest Method of the Win32_Tpm Class
accessdate=2008-05-20] Furthermore, each application that uses the TPM must register a unique passphrase when it takes ownership of the TPM in order to prevent other applications from also making unauthorized use of the TPM while it's enabled. [cite web|url=http://msdn.microsoft.com/en-us/library/aa376479(VS.85).aspx|title=TakeOwnership Method of the Win32_Tpm Class|publisher=Microsoft |accessdate=2008-05-20] Future operating systems are expected to have increased TPM support for additional cryptographic features.TPM Hardware
Starting in 2006, many new laptop computers have been sold with a Trusted Platform Module chip built-in. In the future, this concept could be co-located on an existing
motherboard chip in computers, or any other device where a TPM's facilities could be employed, such as a cell phone.Intel is planning to integrate the TPM capabilities into the southbridge chipset in 2008. [ [https://www.trustedcomputinggroup.org/news/events/pastevents/presentations/GovSec_Presentation_052505.pdf Microsoft PowerPoint - GovSec Presentation_052505_v05.ppt ] ]Trusted Platform Module microcontrollers are currently produced by:
*Atmel
*Broadcom
*Infineon ( [http://www.infineon.com/tpm Infineon TPM] )
*Intel (viaIntel Manageability Engine as iTPM)
* [http://www.sinosun.com.cn/eng/index.asp Sinosun]
*STMicroelectronics
*Winbond TPM Implementation Brand Names
As a specification that manufacturers follow, (vs a product) manufacturers have their own proprietary implementations that meet the TPM standard.
*
Intel =Trusted Execution Technology (Intel® TXT)
*AMD =Presidio (one aspect ofAMD Trinity )ee also
*
Cryptography
*Hengzhi chip
*Next-Generation Secure Computing Base
*Trusted Computing References
External links
* [https://www.trustedcomputinggroup.org/home Trusted Computing Group]
** [https://www.trustedcomputinggroup.org/specs/TPM/ Specifications]
* [http://www.xml-dev.com/blog/index.php?action=viewtopic&id=243 Device Authentication-The answer to attacks launched using stolen passwords?]
* [http://lwn.net/Articles/144681/ LWN: OLS: Linux and trusted computing]
* [http://www.grc.com/sn/SN-099.htm GRC podcast: Trusted Platform Module (TPM)] "(TPM content starts 27 minutes 30 seconds in.)"
* [http://darkside.cometway.com/content.agent?page_name=Article&name=007 TPM Setup (for Mac OS X)]
* [https://www.trustedcomputinggroup.org/news/press/TCG_statement_on_Princeton_Feb_paper_Feb_26.pdf Trusted Computing Group Bulletin on the Security of the Trusted Platform Module (TPM) February 2008]
* [http://www.linuxjournal.com/article/6633 Take Control of TCPA]
* [http://www.cs.dartmouth.edu/~pkilab/sparks/ TPM Reset Attack]
* [http://www.wikipatents.com/7254722.html Trusted platform motherboard having physical presence detection based on activation of power-on-switch]
Wikimedia Foundation. 2010.