Skip to main content

Authentication of Trusted Platform Module Using Processor Response

  • Conference paper
Security in Computing and Communications (SSCC 2014)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 467))

Included in the following conference series:

  • 1118 Accesses

Abstract

Authentication is the process which allows both the communicating entities to validate each other. Authentication is the base for the trust between the two communicating party if both party wants to properly communicate. Trusted Platform Module (TPM) can be used to securely store artifacts like passwords, certificates, encryption keys or measurements required to authenticate the platform. In the present scenario there is no concrete mechanism to authenticate the TPM chip. In this project, a method has been proposed to enable user of a system to authenticate the TPM chip of the communicating system. The proposed system uses public endorsement key of the TPM chip and the unique response the processor gives while executing a program with predefined set of step delays.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Design of secure authentication and transaction protocol: In: Proceeding of International Conference on Computer Science and Service System (CSSS) (2011)

    Google Scholar 

  2. Parno, B., McCune, J.M., Perrig, A.: Bootstrapping Trust in Modern Computers

    Google Scholar 

  3. Trusted Computing Group: Trusted Platform Module Main Specification. Version 1.2, Revision 116 (2011)

    Google Scholar 

  4. Trusted Computing Group: PC client specific TPM interface specification (TIS). Version 1.21, Revision 1.00 (2011)

    Google Scholar 

  5. Sailer, R., Zhang, X., Jaeger, T., van Doorn, L.: Design and implementation of a TCG-based integrity measurement architecture. In: Proceedings of the USENIX Security Symposium (2004)

    Google Scholar 

  6. McCune, J.M., Perrig, A., Reiter, M.K.: Seeing-is-believing: Using camera phones for human-verifiable authentication. In: Proceedings of the IEEE Symposium on Security and Privacy (2005)

    Google Scholar 

  7. Lang, P.: Flash the Intel BIOS with confidence. Intel Developer UPDATE Magazine (2002)

    Google Scholar 

  8. Pirker, M., Toegl, R., Hein, D., Danner, P.: A PrivacyCA for anonymity and trust. In: Chen, L., Mitchell, C.J., Martin, A. (eds.) Trust 2009. LNCS, vol. 5471, pp. 101–119. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  9. http://www.kcchao.wikidot.com/tpm (2014)

  10. Smith, S.W.: Outbound authentication for programmable secure coprocessors. Journal of Information Security 3 (2004)

    Google Scholar 

  11. http://www.ma.rhul.ac.uk (2014)

  12. McCune, J.M.: Flicker: Minimal TCB Code Execution

    Google Scholar 

  13. http://www.grounation.org/?post/2008/07/04/8-

  14. Gasser, M., Goldstein, A., Kaufman, C., Lampson, B.: The digital distributed system security architecture. In: Proceedings of the National Computer Security Conference (1989)

    Google Scholar 

  15. Trusted computing and trusted network connect in a nutshell

    Google Scholar 

  16. http://www.trust.f4.hs-hannover.de (2014)

  17. Arbaugh, W.A., Farber, D.J., Smith, J.M.: A reliable bootstrap architecture. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 65–71 (1997)

    Google Scholar 

  18. Maiti, A., Schaumont, P.: A novel microprocessor intrinsic physical uncloneable function. In: 2012 22nd International Conference on Field Programmable Logic and Applications (FPL), pp. 380–387 (August 2012)

    Google Scholar 

  19. Challenger, et al.: A Practice guide to trusted computing. IBM Press (2008)

    Google Scholar 

  20. Trusted Computing Group (TCG), TPM main part 1.2.3, Design, principles, specifications version 1.2 (2011)

    Google Scholar 

  21. Das, M.L., Saxena, A., Gulati, V.P.: A dynamic ID-based remote user authentication scheme. IEEE Transactions on Consumer Electronics 50(2), 629–631 (2004)

    Article  Google Scholar 

  22. Liu, J.-S.: A TPM Authentication Scheme for Mobile IP. In: International Conference on Computational Intelligence and Security Workshops (2007)

    Google Scholar 

  23. Lee, H., Choi, D., Lee, Y., Won, D., Kim, S.: Security Weaknesses of Dynamic ID-based Remote User Authentication Protocol

    Google Scholar 

  24. Wang, Y., Liu, J., Xiao, F., Dan, J.: A more efficient and secure dynamic ID-based remote user authentication scheme. Computer Communications 32(4), 583–585 (2009)

    Article  Google Scholar 

  25. Li, L., Li, C., Zhou, Y.: A Remote Anonymous Attestation Scheme With improves CA. In: International Conference on Multimedia Information Network and Security (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Rai, V.K., Mishra, A. (2014). Authentication of Trusted Platform Module Using Processor Response. In: Mauri, J.L., Thampi, S.M., Rawat, D.B., Jin, D. (eds) Security in Computing and Communications. SSCC 2014. Communications in Computer and Information Science, vol 467. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-44966-0_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-44966-0_31

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-44965-3

  • Online ISBN: 978-3-662-44966-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics