DocumentCode :
1846686
Title :
Formal Analysis of a TPM-Based Secrets Distribution and Storage Scheme
Author :
Toegl, Ronald ; Hofferek, Georg ; Greimel, Karin ; Leung, Adrian ; Phan, Raphael C W ; Bloem, Roderick
Author_Institution :
IAIK, Graz Univ. of Technol., Graz
fYear :
2008
fDate :
18-21 Nov. 2008
Firstpage :
2289
Lastpage :
2294
Abstract :
Trusted computing introduces the Trusted Platform Module (TPM) as a root of trust on an otherwise untrusted computer. The TPM can be used to restrict the use of cryptographic keys to trusted states, i.e., to situations in which the computer runs trusted software. This allows for the distribution of intellectual property or secrets to a remote party with a reasonable security that such secrets will not be obtained by a malicious or compromised client. We model a specific protocol for the distribution of secrets proposed by Sevine et al. A formal analysis using the NuSMV model checker shows that the protocol allows an intruder to give the client an arbitrary secret, without the client noticing. We propose an alternative that prevents this scenario.
Keywords :
cryptographic protocols; formal specification; industrial property; systems analysis; NuSMV model checker; computer system security; cryptographic key; formal analysis; intellectual property distribution; protocol analysis; secure secret distribution; secure secret storage scheme; trusted computing; trusted platform module; trusted software; Authentication; Computer crime; Computer security; Computer viruses; Cryptographic protocols; Cryptography; Distributed computing; Hardware; Intellectual property; Invasive software; Trusted Computing; model checking; protocol analysis;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Young Computer Scientists, 2008. ICYCS 2008. The 9th International Conference for
Conference_Location :
Hunan
Print_ISBN :
978-0-7695-3398-8
Electronic_ISBN :
978-0-7695-3398-8
Type :
conf
DOI :
10.1109/ICYCS.2008.456
Filename :
4709329
Link To Document :
بازگشت