Trusted Platform Module
In computing, Trusted Platform Module (TPM) is both the name of a published specification detailing a secure cryptoprocessor that can store cryptographic keys that protect information, as well as the general name of implementations of that specification, often called the "TPM chip" or "TPM Security Device" (as designated in certain Dell BIOS settings[1]). The TPM specification is the work of the Trusted Computing Group. The current version of the TPM specification is 1.2 Revision 116, published on March 3rd, 2011.[2] This specification is also available as the international standard ISO/IEC 11889.
Overview
The Trusted Platform Module offers facilities for the secure generation of cryptographic keys, and limitation of their use, in addition to a hardware pseudo-random number generator. It also includes capabilities such as remote attestation and sealed storage.
- "Remote attestation" creates a nearly unforgeable hash-key summary of the hardware and software configuration. The program encrypting the data determines the extent of the summary of the software. This allows a third party to verify that the software has not been changed.
- "Binding" encrypts data using the TPM endorsement key, a unique RSA key burned into the chip during its production, or another trusted key descended from it.[3]
- "Sealing" encrypts data in similar manner to binding, but in addition specifies a state in which the TPM must be in order for the data to be decrypted (unsealed).[4]
Software can use a Trusted Platform Module to authenticate hardware devices. Since each TPM chip has a unique and secret RSA key burned in as it is produced, it is capable of performing platform authentication. For example, it can be used to verify that a system seeking access is the expected system.
Generally, pushing the security down to the hardware level in conjunction with software provides more protection than a software-only solution. However even where a TPM is used, a key is still vulnerable while a software application that has obtained it from the TPM is using it to perform encryption/decryption operations, as has been illustrated in the case of a cold boot attack.
The TPM sometimes goes by the name of the former United States Senator Ernest "Fritz" Hollings. The name "Fritz chip" was coined by Professor Ross Anderson, author of Security Engineering and Professor at the University of Cambridge[5]
Uses
Platform Integrity
The primary scope of a TPM (in combination with other TCG implementations) is to assure the integrity of a platform. In this context "integrity" means "behave as intended" and a "platform" is generically any computer platform - not limited to PCs or just Windows: Start the power-on boot process from a trusted condition and extend this trust until the OS has fully booted and applications running.
Together with the BIOS, the TPM forms a Root of Trust: The TPM contains several PCRs (Platform Configuration Registers) that allow a secure storage and reporting of security relevant metrics. These metrics can be used to detect changes to previous configurations and derive decisions how to proceed. A good example can be found in Microsoft's BitLocker Drive Encryption (see below).
Therefore the BIOS and the Operating System have the primary responsibility to utilize the TPM to assure platform integrity. Only then applications and users running on that platform can rely on its security characteristics such as secure I/O "what you see is what you get", uncompromised keyboard entries, memory and storage operations.
Disk encryption
Full disk encryption applications, such as the BitLocker Drive Encryption feature of Microsoft's Windows Vista Ultimate, Windows Vista Enterprise, Windows Server 2008, and the Windows 7 Enterprise and Windows 7 Ultimate operating systems, can use this technology to protect the keys used to encrypt the computer's hard disks and provide integrity authentication for a trusted boot pathway (i.e. BIOS, boot sector, etc.). A number of third party full disk encryption products also support the TPM chip.
Password Protection
Access to keys, data or systems is often protected and requires authentication by presenting a password. If the authentication mechanism is implemented in software only, the access typically is prone to 'dictionary attacks'. Since the TPM is implemented in a dedicated hardware module, a dictionary attack prevention mechanism was built in, which effectively prevents from guessing or automated dictionary attacks, while still allowing the user for a sufficient and reasonable number of tries. With this hardware based dictionary attack prevention, the user can opt for shorter or weaker passwords which are more memorable. Without this level of protection, only passwords with high complexity would provide sufficient protection.
Other uses and concerns
Almost any encryption-enabled application can in theory make use of a TPM, including:
- Digital rights management
- Software license protection & enforcement
Other uses exist, some of which give rise to privacy concerns. The "physical presence" feature of the TPM addresses some of these concerns by requiring BIOS-level confirmation for operations such as activating, deactivating, clearing or changing ownership of the TPM by someone who is physically present at the console of the machine.[6][7]
TPM hardware
Starting in 2006, many new laptop computers have been sold with a Trusted Platform Module chip built-in. In the future, this concept could be co-located on an existing motherboard chip in computers, or any other device where a TPM's facilities could be employed, such as a cell phone. On PC the LPC bus is used.
Trusted Platform Module microcontrollers are currently produced by:
- Atmel
- Broadcom
- Infineon (Infineon TPM)
- Sinosun
- STMicroelectronics
- Nuvoton (formerly Winbond)
- ITE (ITE TPM)
- Toshiba
- Intel
Criticism
The Trusted Computing Group, the developers of the specification, has faced resistance in some areas to deploy this technology, especially in academia, where some authors still see possible uses not specifically related to Trusted Computing, which may raise privacy concerns. The concerns include the abuse of remote validation of software (where the manufacturer — and not the user who owns the computer system — decides what software is allowed to run) and possible ways to follow actions taken by the user being recorded in a database.[8]
Countries where TPM cannot be legally deployed
Spread
Currently TPM is used by nearly all PC and Notebook manufacturers, primarily offered on professional product lines.
TPM is supported by several vendors:
- Acer, Asus, Dell, Inc., LG, Fujitsu, HP, Lenovo, Samsung, Sony and Toshiba provide TPM integration on their devices.
- Infineon provides both TPM chips and TPM software, which is delivered as OEM versions with new computers, as well as separately by Infineon for products with TPM technology which complies to the TCG standards.
- Wave Systems offers a broad range of client and server software, which runs on all TPM chip-sets. For instance, this software is pre-installed on several models from Dell and Gateway.
- Microsoft's operating systems Windows Vista and Windows 7 as well as Microsoft Windows Server starting from Windows Server 2008 use the chip in conjunction with the included disk encryption software named BitLocker.
- In 2006, with the introduction of the first Macintosh models with Intel processors, Apple started to ship Macs with TPMs. Apple never provided an official driver, but there was a port under GPL available.[12] In 2009, Apple stopped shipping TPMs.[citation needed]
There are also hybrid types, e.g. where the TPM module is integrated into the Ethernet chip, as from Broadcom, while the software which runs “on top” is based on Infineon.
See also
- Hengzhi chip
- Next-Generation Secure Computing Base
- Trusted Computing
- Hardware Security Module
- Unified Extensible Firmware Interface
References
- ^ "Dell OptiPlex GX620 User's Guide". Dell. 2008. Retrieved 2008-06-28.
- ^ "Trusted Platform Module (TPM) Specifications". Trusted Computing Group.
- ^ "tspi_data_bind(3) - Encrypts data blob". Trusted Computing Group. Retrieved 2009-10-27.
- ^ "TPM Main Specification Level 2 Version 1.2, Revision 116 Part 3 - Commands" (PDF). Trusted Computing Group. Retrieved 2011-06-22.
- ^ Anderson, Ross (2003-08). "Trusted Computing FAQ". Cambridge University. Retrieved 2008-06-28.
{{cite web}}
: Check date values in:|date=
(help) - ^ Siani Pearson, Boris Balacheff (2002). Trusted computing platforms:sds TCPA technology in context. Prentice Hall. ISBN 0130092207.
- ^ "SetPhysicalPresenceRequest Method of the Win32_Tpm Class". Microsoft. Retrieved 2009-06-12.
- ^ Stallman, Richard Matthew, "Can You Trust Your Computer", Project GNU, Philosophy, Free Software Foundation.
- ^ a b c d "Low Cost, Strong Authentication with TPM" (PDF). Trusted Computing Group. 2011. Retrieved 2011-08-11.
- ^ a b "Deployment Planning for BitLocker Drive Encryption for Windows Vista". Microsoft TechNet. 2008. Retrieved 2011-08-11.
- ^ "HP Trusted Platform Module". Hewlett-Packard. 2011. Retrieved 2011-08-11.
- ^ Amit Singh: Trusted Computing for Mac OS X
External links
- Trusted Computing Group
- LWN: OLS: Linux and trusted computing
- GRC podcast: Trusted Platform Module (TPM) (TPM content starts 27 minutes 30 seconds in.)
- TPM Setup (for Mac OS X)
- Trusted Computing Group Bulletin on the Security of the Trusted Platform Module (TPM) February 2008
- Take Control of TCPA
- TPM Reset Attack
- Trusted platform motherboard having physical presence detection based on activation of power-on-switch