DOC PREVIEW
SJSU CS 265 - Trusted Computing

This preview shows page 1-2-3 out of 8 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 8 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 8 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 8 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 8 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

[14] Will Knight, Microsoft's anti-piracy plans spark controversy, http://www.newscientist.com/article.ns?id=dn2483[16] Robert Lemos, "Microsoft to nix some Net product activation", http://news.zdnet.com/2100-3513_22-5589504.html[17] Paul Festa, Microsoft yielding to IE standards pressure?, http://news.com.com/Microsoft+yielding+to+IE+standards+pressure/2100-1032_3-5620988.htmlTrusted Computing and Trusted PlatformModules: Technology, Ideology, and EconomicsCS265 ProjectSpring 2005Randy FortThe computing industry has been acutely aware that better means ofauthentication and security have been sorely needed for quite some time.Software alone has failed or proven inadequate in far too many cases. TC(Trusted Computing) is one solution being vigorously pursued by industryheavyweights such as Microsoft, Intel, HP, Infineon and others. This approachutilizes a marriage of hardware and software to eliminate most of the egregiousfailures of software-only solutions.However, the proposed solution, like many proposed security ideas, isaccompanied by a great deal of controversy. There is resistance not only fromconsumer advocates, but also implementation resistance from software vendors.The politics of security are often more important than the technology. This isespecially true in the case of trusted computing. In this paper, I will explore thetechnology, its promises and shortcomings. But even more importantly, I willexamine the market based, and ideological objections.The TechnologyFirst, who is the Trusted Computing Group, and what is a TPM? TheTrusted Computing Group is a non-profit industry consortium, which developshardware and software standards [10]. It is funded by many member companies,including IBM, Intel, AMD, Microsoft, Sony, Sun, and HP [10]. A Trusted PlatformModule, as defined by the Trusted Computing Group, is simply an embedded IC(integrated circuit) built into a platform [6, 10]. Earlier versions of TC were veryPC centric [2]. But a reworking of the standards now encompasses any platformthat has a TPM chip integrated. Since the TPM utilizes an IC embedded into the platform, it has manyadvantages over software-only solutions. For example, the TPM chip couldprevent unauthorized configuration changes, which are the source of muchvulnerability [6]. The storage of software keys, and system configuration hashvalues and passwords in a sealed chip makes unauthorized system modificationprohibitively difficult. Monotonic counters, which cannot be altered like systemclock time, can be factored into cryptographic calculations to prevent replayattacks [3]. Since the encrypted passwords are not visible on the file system, butrather inaccessible in the sealed chip, brute force crack attacks are not feasible.The TPM chip also provides a secure storage area for smart card data, orbiometric data to enable secure two-factor authentication [6]. Future generationsof TPMs, employing Intel's LaGrande technology and Microsoft NGSCB (akaPalladium) software (which will be in the Longhorn release), will have the abilityto prevent screen scraping and keystroke loggers [1, 8]. These capabilities willrequire new compliant hardware, and operating system support. Intel'sLaGrande technology is not expected until late 2005. Microsoft is planningLonghorn for 2006, but is often notoriously late on OS ship dates.The Basic Mechanics of TC and TPM ImplementationOne of the most important concepts of trusted computing is that ofattestation [1, 5]. Attestation essentially means that the originating platformguarantees the accuracy of the information it is providing. Attestation has manydifferent facets beyond the scope of this paper, but they all essentially boil downto verifying the integrity of the information by using the TPM. We should notethat under the current specification a user could not be forced to attest [5, 8].According to version 1.2 of the trusted computing specification, attestation is onlyperformed at the owner's request. But it remains to be seen whether or notvendors will require attestation to use or update software. If a vendor requires aTPM, it essentially becomes “mandatory option” [5].Few of the concepts of trusted computing are new. What TPMs bring tothe table is a secure sealed storage chip for private keys, on-chip cryptoalgorithms and random number generators among others. [5]. "The theory is thatsoftware-based key generation or storage will always be vulnerable to softwareattacks, so private keys should be created, stored, and used by dedicatedhardware [1]". Since the TPM is a separate chip, inaccessible to other systemprocesses, it is more secure than software only. "The TPM represents aseparate trusted coprocessor, whose state cannot be compromised by potentiallymalicious host system software. [4]"IdeologyWhen the history of TC and TPMs is written, its success or failure willprobably hinge upon the ideology of the suspicious more than the technologyitself. Many critics of TPMs fear that cash hungry software companies will utilizeTPMs as a weapon against the users. Since TPMs can be used to enforcelicensing policy, or lock in users, one could reasonably fear that they will be usedto force unwanted upgrades out of customers [7]. Even those with no objectionto DRM schemes have concern over the potential power TPMs give to softwarevendors. Will vendors resist the temptation to use TPMs as a tool for cash flowinstead of security?For example, Microsoft has come under fire for its plans to providesecurity updates only to properly authenticated customers. A program it calls the"Genuine Windows Advantage" [16]. But pundits within the industry havereported that properly licensed owners are often harassed by authentication.Support calls can be required to get keys for OS reinstalls of OEM computers(such as Dell) who have properly licensed Windows. Microsoft may require callsto product activation hotlines even when factory reinstall disks are used on anoriginal unmodified machine [14]. Since users are being already harassed onreinstalls with


View Full Document

SJSU CS 265 - Trusted Computing

Documents in this Course
Stem

Stem

9 pages

WinZip

WinZip

6 pages

Rsync

Rsync

7 pages

Hunter

Hunter

11 pages

SSH

SSH

16 pages

RSA

RSA

7 pages

Akenti

Akenti

17 pages

Blunders

Blunders

51 pages

Captcha

Captcha

6 pages

Radius

Radius

8 pages

Firewall

Firewall

10 pages

SAP

SAP

6 pages

SECURITY

SECURITY

19 pages

Rsync

Rsync

18 pages

MDSD

MDSD

9 pages

honeypots

honeypots

15 pages

VPN

VPN

6 pages

Wang

Wang

18 pages

TKIP

TKIP

6 pages

ESP

ESP

6 pages

Dai

Dai

5 pages

Load more
Download Trusted Computing
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Trusted Computing and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Trusted Computing 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?