A Formal Analysis of TPM 2.0 HMAC Authentication
Trusted Platform Module (TPM) is the ”root of trust” of the whole trusted computing platform.It is necessary to analyze the TPM 2.0 specifications to judge whether it has the old vulnerabilities in TPM 1.2 or new vulnerabilities.This paper describes the TPM 2.0 HMAC authentication scheme as a security protocol,and make a detail comparation of the TPM 2.0 authentication to the TPM 1.2 ”Object-Independent Authorization Protocol” (OIAP) and the ”Object-Specific Authorization Protocol” (OSAP).Then the authors use the typed pi calculus to describe the TPM2_Create() command to illustrate the formal modelling of TPM 2.0 HMAC authentication protocol,and use ProVerify to reason that the previous attack for TPM 1.2 TPM_CreateWrapKey does not exist anymore,because the access entity unique name has been linked to the TPM 2.0 HMAC value calculation.
Trusted Platform Module 2.0 (TPM 2.0) Trusted Computing HMAC Authorization Session
国内会议
湖北恩施
英文
1-19
2014-09-13(万方平台首次上网日期,不代表论文的发表时间)