Trusted platform module basics using tpm in embedded systems pdf

The trusted platform module comes of age june 20 a sans whitepaper written by gal shpantzer. Additionally, if you check the status of the tpm by using windows tpm management console, you receive a compatible tpm cannot be found message. The last revised edition of tpm main specification version 1. The trusted platform module tpm and smart card devices have many features in common. A tpm chip is a tamperresistant device equipped with a random number generator, nonvolatile storage, encryption functions,andstatusregisters,whichcanbeutilizedforapplications such as ensuring platform integrity and securely storingkeys. The tpm, a secure cryptographic integrated circuit ic, provides a hardwarebased approach to manage user authentication, network access, data protection and more that takes security to higher level than softwarebased security. The tpm is usually installed on the motherboard of a computer, and it communicates with the remainder of the system by using a hardware bus. A technical introduction to the use of trusted platform. For the tpm to operate, it must have an endorsement key embedded in it. The trusted computing groupis root of trust, the trusted platform module tpm, is an integral part of virtually every enterprise level computer sold today. The tpb trusted platform board is an expansion of the tpm trust platform module chip for the elevation of the efficiency and usability of the tpm chip that has been developed from the tcg. Such an event might involve the loading of a new software module or the configuration information of a specific hardware devicebasically everything that has an effect on.

This chapter describes trusted computing group tcg main specification modifications in regard to migration from a trusted platform module tpm 1. Read on oreilly online learning with a 10day trial start your free trial now buy on amazon. It holds computergenerated encryption keys used to bind and authenticate input and output data passing through a system. Using the trusted platform module in the new age of security is a straightforward primer for developers. Tpm is a crypto processor that is installed on the embedded device and communicates with the cpu using spi or i2c, it carries out keys handling, cryptographic operations and functions, and certificates management. Syslogic has responded to this need with a retrofittable tpm trusted platform module for embedded systems. Tpm is implemented as a secure hardware chip and provides the hardware root of trust. Trusted platform module tpm is an international standard for a secure cryptoprocessor, which is a dedicated microprocessor designed to secure hardware by integrating cryptographic keys into devices.

To mitigate this threat, it is desirable to enable commonlyused embedded processors known as. Currently, all tpms must be provisioned to use for txt. This article offers a brief overview of the tpm, describes how it works, and discusses the benefits that tpm brings to windows 10as well as the cumulative security impact of running windows 10 on a pc that contains a tpm. Feb 21, 2007 trusted platform module is vistacompatible munich, germany. But a tpm is intimately tied into how a computer boots and runs, which means it. Jan 01, 2000 the tpm is a lowcost, but powerful and flexible, cryptoprocessor. The trusted computing group an industry consortium including microsoft, hp, dell, sony, lenovo, toshiba, vodafone, seagate. There are 100 million tpms currently in existence 2, mostly in highend laptops made by hp, dell, sony, lenovo, toshiba, and others. The tpm is a chip thats part of your computers motherboard if you bought an offtheshelf pc, its soldered onto the motherboard. A trusted platform module tpm is not recognized on some. Trusted platform module tpm we recommend that this installation manual be printed. Tpm functions can be implemented either in hardware or software. Tpm has been designed to provide trusted computing based on trusted computing group tcg specifications. In practice a tpm can be used for various different security applications such as secure boot, key storage and random number generation.

This permits the owner of the system to control initialization of the tpm and create all the passwords. The core functionality, based on a hardware component known as trusted platform module tpm, is widely available. Jan 25, 2017 hp desktops, notebooks, and workstations hp tpm configuration utility with windows 10 anniversary edition compatible tpm firmware notice. How microsoft is implementing tpm technology into windows security features.

Still, his book provides a basic background in trusted computing and the cryptography implemented using tpms. Trusted platform module basics using tpm in embedded systems. For those not familiar with tcg and the tpm, the tpm timeline provides some. Trusted platform module tpm, also known as isoiec 11889 is an international standard for a secure cryptoprocessor, a dedicated microcontroller designed to secure hardware through integrated cryptographic keys. Trusted supply chain and remote provisioning with the trusted platform module. In our improved tpm, a trusted measurement method with chain model and star type. Embedded into devices, whether pcs, servers, networking gear, mobile platforms or embedded systems of any kind, the root of trust, typically implemented by the trusted platform module tpm, provides a proven, safe foundation for more secure computing. I would have liked to see some very basic c programs included to get a better feel of actually using the commands together. Trusted platform module an overview sciencedirect topics. Building hardware based security with a trusted platform. A brief introduction the trusted computing group tcg has been addressing the trust issue and related security benefits for pcs, servers, networking gear and embedded systems for more than a decade, driven by the trusted platform module tpm specification.

Clear, practical tutorial style text with realworld applications first book on tpm for embedded designers provides a sound foundation on the tpm, helping. Visualization of trusted multiclients monitoring with tpm. What is a tpm, and why does windows need one for disk encryption. As a result, the tpm s secure storage and cryptographic functions are available to operating systems and applications running in.

One alternative is to use a softwarebased tpm, which implements tpm functions using software that executes in a protected execution domain on the embedded processor itself. Pdf a softwarebased trusted platform module emulator. Aug 30, 2015 securing embedded linux systems with tpm 2. In this section, we open the discussion with a brief description of the trusted. A tpm chip is a secure cryptoprocessor that is designed to carry out cryptographic operations. Tpm secures your data with a secure algorithm integrated into your computer hardware. It also includes capabilities such as remote attestation and sealed storage. The trusted platform module tpm is a hardware chip designed to enable commodity computers to achieve greater levels of security than was previously possible. Trusted platform module tpm was conceived by a computer industry consortium called trusted computing group tcg, and was standardized by international organization for standardization iso and international electrotechnical commission iec in 2009 as isoiec 11889 tcg continued to revise the tpm specifications. The software trusted platform module sw tpm is built in the kernel mode to provide trusted computing services. Nov 20, 20 on some windows 7based and windows8 based devices, a trusted platform module tpm is not recognized as a compatible device and cannot be used for certain applications such as bitlocker drive encryption and virtual smart card.

Download for offline reading, highlight, bookmark or take notes while you read a practical guide to tpm 2. Covers all the tpm basics, discussing in detail the tpm key hierarchy and the trusted platform module specification presents a methodology to enable designers and developers to successfully integrate the tpm into an embedded design and verify the tpm s operation on a specific platform. Sep, 2006 clear, practical tutorial style text with realworld applicationsfirst book on tpm for embedded designersprovides a sound foundation on the tpm, helping designers take advantage of hardware security based on sound tcg standardscovers all the tpm basics, discussing in detail the tpm key hierarchy and the trusted platform module specificationpresents a methodology to enable designers and. Abstract the trusted platform module tpm and smart card devices have many. Cumulative attestation kernels for embedded systems. Syslogic develops and manufactures embedded systems used as controls in a wide range of industries. Covers all the tpm basics, discussing in detail the tpm key hierarchy and the trusted platform module specification presents a methodology to enable designers and developers to successfully integrate the tpm into an embedded design and verify the tpms operation on a specific platform. A trusted platform module tpm is a microchip designed to provide basic securityrelated functions, primarily involving encryption keys. The tpm generates encryption keys, keeping part of the key to itself. Its main focus is explaining the various trusted platform module tpm commands used within the tcg v1. Using trusted platform module tpm to secure business communication sbc in vehicular ad hoc network vanet. Security is one of the major challenges in the realization of the iiot industrial internet of things and industry 4.

The tpm provides cryptographic functions in a costeffective, tamperresistant device which are an. Trusted platform module ownership the trusted platform module is disabled by default when shipped and the ownerend customer of the sy stem assume s ownership of the tpm. Jan 31, 2017 this webinar will address a fundamental and key aspect to it security. The trusted platform module explained cryptomathic. Use features like bookmarks, note taking and highlighting while reading trusted platform module basics. Sans analyst program 1 implementing hardware roots of trust. In an effort to ensure safe environment, a high security root of trust, tpm stands for trusted platform module are used.

Pdf an introduction to the trusted platform and mobile trusted. The information in this document, including products and software versions, is current as of the release date. Clear, practical tutorial style text with realworld applicationsfirst book on tpm for embedded designersprovides a sound foundation on the tpm, helping designers take advantage of hardware security based on sound tcg standardscovers all the tpm basics, discussing in detail the tpm key hierarchy and the trusted platform module specificationpresents a methodology to enable. Table of contents for trusted platform module basics.

Using tpm in embedded systems embedded technology kindle edition by kinney, steven l download it once and read it on your kindle device, pc, phones or tablets. Using tpm in embedded systems embedded technology kinney, steven l. Standardizing trust for embedded systems infineon technologies. Trusted platform module technology overview windows 10. To achieve many of these security enhancements, windows 10 makes extensive use of the trusted platform module tpm. Steven kinney intended for embedded designers, this book provides a foundation on the tpm, helping designers take advantage of hardware security based on sound tcg standards.

Trusted computing group and the trusted platform module. The trusted platform module, or tpm, is similar to a smart card device in that it is a small footprint low cost security module typically implemented as a tamper resistant integrated circuit ic. Pdf the trusted platform module tpm is a tamperresistant component. Both are low cost, tamper resistant, small footprint devices used to provide the basis of a secure computing. Embedded security tpm submenu using the user password, ask the administrator for the supervisor password. How to use the trusted platform module tpm for trust and. The trusted platform module tpm is a special purpose microcontroller designed by the trusted computing group, which interfaces with a standard hardwaresoftware platform in order to allow it to be secured to serve the interests of just one party the system designer. However, for many resourceconstrained embedded systems, the size and cost overheads of a separate trusted platform module tpm chip are not acceptable. The trusted platform module offers facilities for the secure generation of cryptographic keys, and limitation of their use, in addition to a random number generator.

Addressing this issue, we analyze the challenges in the research of tpm posed by the embedded system environment, and propose a novel embedded trusted platform module etpm that can adapt to such. If you built your own computer, you can buy one as an addon module if your motherboard supports it. A trusted computing architecture of embedded system based on. Nov 29, 2018 trusted platform module tpm technology is designed to provide hardwarebased, securityrelated functions. Detailed realworld application examples throughout the book use the popular atmel singlechip implementation of the tpm, which was created specifically for use in embedded designs. System or component that will not fail with respect to the security policy. Using trusted platform module to mitigate ssl stripping.

Trusted platform module tpm quick reference guide 7 trusted platform module ownership the trusted platform module is disabled by default when shipped and the ownerend customer of the system assumes ownership of the tpm. The company is now launching a retrofittable trusted platform module tpm, which can be connected to the cpu boards in syslogic industrial computers and touch controls via the lpc low pin count interface. It shows security and tpm concepts, demonstrating their usage in real applications that the reader can build themselves. A trusted platform module tpm is a specialized chip on an endpoint device that stores rsa encryption keys specific to the host system for hardware authentication. The tpm is a security device that is able to record and report events that occurred on a platform. Philip roman, vouthanack sovann, kenneth triplin, david um, michael violante, amy wees csec640, 9046 november 25, 2012 introduction the focus of this paper is to discuss both current issues and recent developments in trusted platform module tpm security as well as its strengths and weaknesses. Both are low cost, tamper resistant, small footprint devices used to provide the basis of a secure computing environment. Tpm trusted platform module and windows 10 part 2 youtube. Presents a methodology to enable designers and developers to successfully integrate the tpm into an embedded design and verify the tpm s operation on a specific platform. The method uses a trusted platform module tpm to enhance the hrot functionality. Trusted platform module tpm is the core component of trusted computing.

The company is now launching a retrofittable trusted platform module tpm, which can be connected to the cpu boards in syslogic industrial computers and touch controls via. It describes security and tpm concepts using diagrams, lowlevel code examples, and highlevel use cases. Trusted platform module tpm chips are used in all types of computers from personal laptops, to business computers, to industrial panel pcs, to medical computers. To this end, we virtualized the trusted platform module tpm. This permits the owner of the system to control initialization of the tpm and create all the. This webinar will address a fundamental and key aspect to it security. A read is counted each time someone views a publication summary such as the title, abstract, and list of authors, clicks on a figure, or views or downloads the fulltext. Using the trusted platform module in the new age of security aims to educate developers, security architects, engineering management, and ordinary users about tpm 2. Tpm fundamentals windows 10 microsoft 365 security. Remote attestation creates a nearly unforgeable hashkey summary of the. The chip includes multiple physical security mechanisms to make it tamper resistant, and malicious software is unable to tamper with the.

Covers all the tpm basics, discussing in detail the tpm key hierarchy and the trusted platform module specification. A tpm does many of the things that a smartcard or hardware security module hsm does for example, it is able to create, manage and use cryptographic keys, as well as store confidential data. Security has become a key design consideration for many embedded engineers due to the significant advances in embedded systems networking capabilities. Trusted platform module is vistacompatible electronic design. It shows security and tpm concepts, demonstrating their use in real applications that the reader can try out. Trusted platform module basics 1st edition elsevier. There is a chapter on some of the differences between v1. Tpm key backup and migration infineon technologies.

This chapter presents an introduction to the security mechanisms provided by the tpm highlighting those not typically found on a smart card. The increasing complexity of systems and the deeply embedded nature of todays threats means that security. Using the trusted platform module in the new age of security ebook written by will arthur, david challener. A trusted platform module tpm is a type of secure cryptoprocessor, which is a specialized chip used to carry out cryptographic operations like the storing of encryption keys to secure information which is usually used by the host system to authenticate hardware. There are increasing deployments of networked embedded systems and rising threats of malware intrusions on such systems. The trusted platform module tpm currently used by pcs is not suitable for embedded. However, integration and application in embedded systems remains limited at present, simply because of the extremely steep learning curve involved in using the programmerfacing interfaces. The core of every trusted platform is the trusted platform module tpm. After that, the schedule policy and priority of tpmd, which is the daemon of sw. It includes access to a live execution environment and real code examples. Using the trusted platform module in the new age of security. Can be used to sign an outgoing email message, for instance, or sign a challenge directed to the tpm by some remote system, such as a network host. Special thanks are due to david challener, julian hammersley, graeme proudler, and ari singer who served as chair of the tpm working group at. Hardware root of trust for linux based edge gateway diva.

519 1524 1357 900 1419 380 339 769 611 410 1449 462 971 217 833 406 1482 1305 1500 1592 668 1570 1291 1484 834 757 623 1048 680 247 50 131 910