首页> 外文会议>International conference on information security practice and experience >Automated Proof for Authorization Protocols of TPM 2.0 in Computational Model
【24h】

Automated Proof for Authorization Protocols of TPM 2.0 in Computational Model

机译:计算模型中TPM 2.0授权协议的自动证明

获取原文

摘要

We present the first automated proof of the authorization protocols in TPM 2.0 in the computational model. The Trusted Platform Module(TPM) is a chip that enables trust in computing platforms and achieves more security than software alone. The TPM interacts with a caller via a predefined set of commands. Many commands reference TPM-resident structures, and use of them may require authorization. The TPM will provide an acknowledgement once receiving an authorization. This interact ensure the authentication of TPM and the caller. In this paper, we present a computationally sound mechanized proof for authorization protocols in the TPM 2.0. We model the authorization protocols using a probabilistic polynomial-time calculus and prove authentication between the TPM and the caller with the aid of the tool CryptoVerif, which works in the computational model. In addition, the prover gives the upper bounds to break the authentication between them.
机译:我们在计算模型中提出了TPM 2.0中授权协议的第一个自动证明。可信平台模块(TPM)是一种芯片,可实现对计算平台的信任,并比单独的软件实现更高的安全性。 TPM通过一组预定义的命令与呼叫者进行交互。许多命令引用了TPM驻留结构,使用它们可能需要授权。一旦收到授权,TPM将提供确认。这种交互确保了TPM和呼叫者的身份验证。在本文中,我们为TPM 2.0中的授权协议提供了一种计算合理的机械化证明。我们使用概率多项式时间演算对授权协议进行建模,并借助可在计算模型中使用的工具CryptoVerif证明TPM与调用方之间的身份验证。另外,证明者给出上限以打破它们之间的认证。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号