Title :
A New Authorization Protocol for Trusted Computing
Author :
Xing, Zhang ; Xiaofei, Zhang ; Changxiang, Shen
Author_Institution :
Beijing Univ. of Technol., Beijing
Abstract :
The paper analyses the security of the authorization protocols in the v1.2 specification of TPM. It points out that these protocols have some shortcomings such as function overlap, and the leakage of verifying authenticated data. Then a new authorization protocol, which protects the integrity and confidentiality of the communication data, is proposed. It can also prevent replay attacks. Most kinds of TPM operations can be implemented by the protocol.
Keywords :
authorisation; data integrity; formal specification; TPM; authenticated data verification; authorization protocol security; communication data confidentiality; communication data integrity; replay attacks prevention; trusted computing; v1.2 specification; Authorization; Computer aided manufacturing; Computer architecture; Data privacy; Data security; Information analysis; Information security; Paper technology; Protection; Transport protocols;
Conference_Titel :
Data, Privacy, and E-Commerce, 2007. ISDPE 2007. The First International Symposium on
Conference_Location :
Chengdu
Print_ISBN :
978-0-7695-3016-1
DOI :
10.1109/ISDPE.2007.123