首页> 外文期刊>Computer networks >A comprehensive formal security analysis and revision of the two-phase key exchange primitive of TPM 2.0
【24h】

A comprehensive formal security analysis and revision of the two-phase key exchange primitive of TPM 2.0

机译:全面的正式安全分析和修订TPM 2.0的两相关键交换原语

获取原文
获取原文并翻译 | 示例

摘要

The Trusted Platform Module (TPM) version 2.0 provides a two-phase key exchange primitive which can be used to implement three widely-standardized authenticated key exchange protocols: the Full Unified Model, the Full MQV, and the SM2 key exchange protocols. However, vulnerabilities have been found in all of these protocols. Fortunately, it seems that the protections offered by TPM chips can mitigate these vulnerabilities. In this paper, we present a security model which captures TPM's protections on keys and protocols' computation environments and in which multiple protocols can be analyzed in a unified way. Based on the unified security model, we give the first formal security analysis of the key exchange primitive of TPM 2.0, and the analysis results show that, with the help of hardware protections of TPM chips, the key exchange primitive indeed satisfies the welldefined security property of our security model, but unfortunately under some impractical limiting conditions, which would prevent the application of the key exchange primitive in real-world networks. To make TPM 2.0 applicable to real-world networks, we present a revision of the key exchange primitive of TPM 2.0, which can be secure without the limiting conditions. We give a rigorous analysis of our revision, and the results show that our revision achieves not only the basic security property of modern AKE security models but also some further security properties.
机译:可信平台模块(TPM)版本2.0提供了一种两相密钥交换原语,可用于实现三个广泛标准化的经过标准验证的密钥交换协议:完整的统一模型,全MQV和SM2密钥交换协议。但是,在所有这些协议中都发现了漏洞。幸运的是,TPM芯片提供的保护似乎可以减轻这些漏洞。在本文中,我们提出了一种安全模型,其捕获TPM对键和协议的计算环境的保护,并且可以以统一的方式分析多种协议。基于统一的安全模型,我们给出了TPM 2.0关键交换原语的第一个正式安全分析,分析结果表明,在TPM芯片的硬件保护的帮助下,关键交换原语确实满足了良好的安全性我们的安全模式,但遗憾的是在一些不切实际的限制条件下,这将阻止关键交换原语在现实网络中的应用。为了使TPM 2.0适用于现实网络,我们提供了TPM 2.0关键交换原语的修订,可以在没有限制条件的情况下安全。我们对我们的修订进行了严格的分析,结果表明,我们的修订不仅可以实现现代AKE安全模型的基本安全性,而且还实现了一些进一步的安全性质。

著录项

  • 来源
    《Computer networks》 |2020年第9期|107369.1-107369.18|共18页
  • 作者

    Zhang Qianying; Zhao Shijun;

  • 作者单位

    Capital Normal Univ Coll Informat Engn Beijing Peoples R China|Beijing Engn Res Ctr High Reliable Embedded Syst Beijing Peoples R China|Chinese Acad Sci Inst Comp Technol State Key Lab Comp Architecture Beijing Peoples R China;

    Huawei Technol Co Ltd Shenzhen Peoples R China;

  • 收录信息
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    Security analysis; Authenticated key exchange; TPM 2.0;

    机译:安全分析;经过认证的密钥交换;TPM 2.0;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号