Abstract
Authentication is the process which allows both the communicating entities to validate each other. Authentication is the base for the trust between the two communicating party if both party wants to properly communicate. Trusted Platform Module (TPM) can be used to securely store artifacts like passwords, certificates, encryption keys or measurements required to authenticate the platform. In the present scenario there is no concrete mechanism to authenticate the TPM chip. In this project, a method has been proposed to enable user of a system to authenticate the TPM chip of the communicating system. The proposed system uses public endorsement key of the TPM chip and the unique response the processor gives while executing a program with predefined set of step delays.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Design of secure authentication and transaction protocol: In: Proceeding of International Conference on Computer Science and Service System (CSSS) (2011)
Parno, B., McCune, J.M., Perrig, A.: Bootstrapping Trust in Modern Computers
Trusted Computing Group: Trusted Platform Module Main Specification. Version 1.2, Revision 116 (2011)
Trusted Computing Group: PC client specific TPM interface specification (TIS). Version 1.21, Revision 1.00 (2011)
Sailer, R., Zhang, X., Jaeger, T., van Doorn, L.: Design and implementation of a TCG-based integrity measurement architecture. In: Proceedings of the USENIX Security Symposium (2004)
McCune, J.M., Perrig, A., Reiter, M.K.: Seeing-is-believing: Using camera phones for human-verifiable authentication. In: Proceedings of the IEEE Symposium on Security and Privacy (2005)
Lang, P.: Flash the Intel BIOS with confidence. Intel Developer UPDATE Magazine (2002)
Pirker, M., Toegl, R., Hein, D., Danner, P.: A PrivacyCA for anonymity and trust. In: Chen, L., Mitchell, C.J., Martin, A. (eds.) Trust 2009. LNCS, vol. 5471, pp. 101–119. Springer, Heidelberg (2009)
Smith, S.W.: Outbound authentication for programmable secure coprocessors. Journal of Information Security 3 (2004)
http://www.ma.rhul.ac.uk (2014)
McCune, J.M.: Flicker: Minimal TCB Code Execution
Gasser, M., Goldstein, A., Kaufman, C., Lampson, B.: The digital distributed system security architecture. In: Proceedings of the National Computer Security Conference (1989)
Trusted computing and trusted network connect in a nutshell
Arbaugh, W.A., Farber, D.J., Smith, J.M.: A reliable bootstrap architecture. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 65–71 (1997)
Maiti, A., Schaumont, P.: A novel microprocessor intrinsic physical uncloneable function. In: 2012 22nd International Conference on Field Programmable Logic and Applications (FPL), pp. 380–387 (August 2012)
Challenger, et al.: A Practice guide to trusted computing. IBM Press (2008)
Trusted Computing Group (TCG), TPM main part 1.2.3, Design, principles, specifications version 1.2 (2011)
Das, M.L., Saxena, A., Gulati, V.P.: A dynamic ID-based remote user authentication scheme. IEEE Transactions on Consumer Electronics 50(2), 629–631 (2004)
Liu, J.-S.: A TPM Authentication Scheme for Mobile IP. In: International Conference on Computational Intelligence and Security Workshops (2007)
Lee, H., Choi, D., Lee, Y., Won, D., Kim, S.: Security Weaknesses of Dynamic ID-based Remote User Authentication Protocol
Wang, Y., Liu, J., Xiao, F., Dan, J.: A more efficient and secure dynamic ID-based remote user authentication scheme. Computer Communications 32(4), 583–585 (2009)
Li, L., Li, C., Zhou, Y.: A Remote Anonymous Attestation Scheme With improves CA. In: International Conference on Multimedia Information Network and Security (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Rai, V.K., Mishra, A. (2014). Authentication of Trusted Platform Module Using Processor Response. In: Mauri, J.L., Thampi, S.M., Rawat, D.B., Jin, D. (eds) Security in Computing and Communications. SSCC 2014. Communications in Computer and Information Science, vol 467. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-44966-0_31
Download citation
DOI: https://doi.org/10.1007/978-3-662-44966-0_31
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-44965-3
Online ISBN: 978-3-662-44966-0
eBook Packages: Computer ScienceComputer Science (R0)