会议专题

A Formal Analysis of TPM 2.0 HMAC Authentication

  Trusted Platform Module (TPM) is the ”root of trust” of the whole trusted computing platform.It is necessary to analyze the TPM 2.0 specifications to judge whether it has the old vulnerabilities in TPM 1.2 or new vulnerabilities.This paper describes the TPM 2.0 HMAC authentication scheme as a security protocol,and make a detail comparation of the TPM 2.0 authentication to the TPM 1.2 ”Object-Independent Authorization Protocol” (OIAP) and the ”Object-Specific Authorization Protocol” (OSAP).Then the authors use the typed pi calculus to describe the TPM2_Create() command to illustrate the formal modelling of TPM 2.0 HMAC authentication protocol,and use ProVerify to reason that the previous attack for TPM 1.2 TPM_CreateWrapKey does not exist anymore,because the access entity unique name has been linked to the TPM 2.0 HMAC value calculation.

Trusted Platform Module 2.0 (TPM 2.0) Trusted Computing HMAC Authorization Session

国内会议

第八届中国可信计算与信息安全学术会议

湖北恩施

英文

1-19

2014-09-13(万方平台首次上网日期,不代表论文的发表时间)