On the provable security of TPM2.0 cryptography APIs

被引:0
|
作者
Chu, Xiaobo [1 ]
Feng, Dengguo [1 ]
机构
[1] Chinese Acad Sci, Inst Software, TCA Lab, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
trusted computing; Trusted Computing Group; TCG; trusted platform module; TPM; TPM2.0; key management; cryptography API; secure API; provable security; embedded system;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Trusted platform module (TPM), core of trusted computing technique, is one of the most prevalent security chips in the world. In 2013, Trusted Computing Group formally upgraded TPM specification to version 2.0, and introduced a comprehensive and powerful trusted computing technique architecture. However, the new specification is rather complex and thus error prone, which makes it necessary to evaluate TPM2.0's security. In this paper, we focus on cryptography subsystem of TPM2.0. We define the first computation model of TPM2.0 cryptography APIs, and prove their security in this strong model using game sequence and simulation. This proof provides high level confidence on security guarantee of TPM2.0 cryptography subsystem. We also carry out experiments on these APIs and compare them with previous version. The experiment shows that flexibility of TPM2.0 does not reduce its performance, meanwhile, real TPM2.0 product still needs to be improved.
引用
收藏
页码:230 / 243
页数:14
相关论文
共 50 条
  • [1] Formal analysis of TPM2.0 key management APIs
    Zhang, Qianying
    Zhao, Shijun
    Qin, Yu
    Feng, Dengguo
    [J]. CHINESE SCIENCE BULLETIN, 2014, 59 (32): : 4210 - 4224
  • [2] Formal analysis of TPM2.0 key management APIs
    Qianying Zhang
    Shijun Zhao
    Yu Qin
    Dengguo Feng
    [J]. Science Bulletin, 2014, 59 (32) : 4210 - 4224
  • [3] Security analysis of SM2 key exchange protocol in TPM2.0
    Zhao, Shijun
    Xi, Li
    Zhang, Qianying
    Qin, Yu
    Feng, Dengguo
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (03) : 383 - 395
  • [4] Runtime Firmware Product Lines Using TPM2.0
    Fuchs, Andreas
    Krauss, Christoph
    Repp, Juergen
    [J]. ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2017, 2017, 502 : 248 - 261
  • [5] Formal analysis of HMAC authorisation in the TPM2.0 specification
    Shao, Jianxiong
    Qin, Yu
    Feng, Dengguo
    [J]. IET INFORMATION SECURITY, 2018, 12 (02) : 133 - 140
  • [6] Provable Security in Quantum Cryptography
    Renner, Renato
    [J]. IT-INFORMATION TECHNOLOGY, 2007, 49 (02): : 127 - 130
  • [7] On provable security for conventional cryptography
    Vaudenay, S
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC'99, 2000, 1787 : 1 - 16
  • [8] Cryptography and the methodology of provable security
    Stern, J
    [J]. APPLIED ALGEBRA, ALGEBRAIC ALGORITHMS AND ERROR-CORRECTING CODES, PROCEEDINGS, 2003, 2643 : 1 - 5
  • [9] Fundamental problems in provable security and cryptography
    Dent, Alexander W.
    [J]. PHILOSOPHICAL TRANSACTIONS OF THE ROYAL SOCIETY A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 2006, 364 (1849): : 3215 - 3230
  • [10] TPM2.0 Key Migration-protocol Based on Duplication Authority
    Tan L.
    Song M.
    [J]. Ruan Jian Xue Bao/Journal of Software, 2019, 30 (08): : 2287 - 2313