Skip to main content

Basics of Trusted Platforms

  • Chapter
  • First Online:
Trusted Computing Platforms

Abstract

Trusted Computing is constrained by legacy issues, customer expectations, legal matters, privacy, and disaster recovery. Many aspects of Trusted Computing come as no surprise to anyone versed in the art of information security: one must provide process isolation and can’t avoid certificates, authorisation or authentication; one must provide a good level of security, avoid global secrets, abide by the principle of separation of privilege, and deal with dictionary attacks. On the other hand, Trusted Computing is distinguished by concepts such as Roots of Trust, authenticated platform boot, platform attestation, and privacy-friendly platform identification and platform recognition. All types of trusted platform have a particular trusted platform lifecycle, from design to decommissioning.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 179.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    CESG is the UK National Technical Authority for Information Assurance.

  2. 2.

    This nomenclature is explained below.

  3. 3.

    Commented by Ken Nicholson of the Panasonic Company.

  4. 4.

    Given Hewlett-Packard’s long-standing involvement with TCG, and HP’s printer business, it is perhaps not surprising that a long-standing joke within TCG is that HP’s representatives encourage large specifications.

  5. 5.

    Nothing in this book should be construed as legal advice.

  6. 6.

    It has been commented that any command to erase the EK should be called “TPM_EraseProfit”, because it would cause considerable customer anger and expense.

  7. 7.

    TPMs use nonvolatile (persistent) data storage to store long-term variables , and also allow the Owner to persistently store small quantities of data.

References

  1. “vision statement for the future direction of the application of the CC and the CCRA” (April 2014) www.commoncriteriaportal.org/vision.cfm

  2. “Supporting Documents for Smartcards and similar devices” (otherwise known as “Rationale for Smart cards and similar devices”) (April 2014) http://www.commoncriteriaportal.org/files/operatingprocedures/2006-06-001.pdf

  3. “Application of Attack Potential to Smartcards” (April 2014) http://www.commoncriteriaportal.org/files/supdocs/CCDB-2012-04-002.pdf

  4. “Commercial Product Assurance” (April 2014) http://www.cesg.gov.uk/servicecatalogue/Product-Assurance/CPA/Pages/CPA.aspx

  5. “Commercial Product Assurance - International Aspects” (April 2014) www.cesg.gov.uk/News/Pages/CPA-InternationalAspects.aspx

  6. “On the deployment of Mobile Trusted Module s” (April 2014) http://andreas.schmidt.novalyst.de/docs/MTM_deployment_paper.pdf.

  7. “Common Criteria Toolkit” (April 2014) http://www.iso15408.net/

  8. “Guidelines on Hardware-Rooted Security in Mobile Devices” (April 2014) http://csrc.nist.gov/publications/drafts/800-164/sp800_164_draft.pdf.

  9. An open-source implementation of TPMv1.2 software (April 2014) http://ibmswtpm.sourceforge.net/.

  10. “PC-Client TPM Certified Products List” (April 2014) www.trustedcomputinggroup.org/certification/certificationtpm_certified_products_list.

  11. TCG certification (April 2014) http://www.trustedcomputinggroup.org/certification

  12. TCG’s Protection Profile for TPMs (April 2014) http://www.trustedcomputinggroup.org/resources/tpm_12_protection_profile

  13. Section 5.A.2.a.1 “Wassenaar Information Security Category 5 Part II export controls” http://www.wassenaar.org/controllists/index.html

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Proudler, G., Chen, L., Dalton, C. (2014). Basics of Trusted Platforms. In: Trusted Computing Platforms. Springer, Cham. https://doi.org/10.1007/978-3-319-08744-3_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-08744-3_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-08743-6

  • Online ISBN: 978-3-319-08744-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics