Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

TCPM

Security Presentation
by

David Collins

on 16 November 2012

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of TCPM

Trusted Computing Platform Module David Collins
Andrew McGillivray
Tyler Todd what a tcpm looks like What is TCPM(or tpm)? Agenda What is a TCPM? RESOURCES: Img 1
http://www.infineon.com/cms/cn/corporate/press/news/releases/2005/132443.html

http://iase.disa.mil/policy-guidance/dod-dar-tpm-decree07-03-07.pdf

http://blog.morrisontechnologies.com/2010/07/21/the-social-hacking-of-the-un-trusted-platform-module-tpm/ What a tcpm looks like Its purpose is to ensure that the information like keys, passwords, and digital certificates that it stores are made more secure from external software attacks and physical theft. Trusted Computer Platform Module is a chip that is installed on the Motherboard of most Desktops, Laptops, and Tablet PCs today. What is a TCPM? Hardware example Trusted Platform Modules provide a so-called hash value for the complete system by using Secure Hash Algorithm or SHA. This SHA is determined my the various different hardware elements of the system. The computer will only start into an authorized state if the TCPM recognizes the Hash Value. This gains access to the encrypted root key and the trusted computing aplication and access trusted/secure data. If an unrecognized hash value is found then only access to the free files and programs. How it works Examples SAIT LAPTOPS Home PC tablet pc Intel and amd apProach Intel "TXT" AMd "sem" Due to its relation to computer and data security, governmental bodies such as the U.S Department of Defense requires that every computer purchased MUST contain a TPM chip Security vulnerabilities Intel and AMD approach Intel and AMD both have very little information regarding their own
version of the Trusted Platform
Module

Intel's version of TPM is called Trusted Execution Technology

AMD's is Secure Execution Mode TPM vulnerabilities - The TPM is a fairly secure piece of hardware. It uses two 2048-bit asymmetric keys .

- a "Cold Boot attack" is possible. System is shutdown ungracefully, keys are pulled at boot time (Usually with
LIVE CD or USB) .

- OEM's carry "Master keys" .

- "Master keys" have been social engineered out of support staff at OEM's TXT relies heavily on
the Trusted Platform Module
to perform tasks such as secure storage of measurements performed by the TPM.
The TXT also authenticates every step of the boot process. Works in much the same way as Intel TXT, though information about this their TPM implementation is scarce. Each TPM has a unique key that is burned in during manufacturing.
Full transcript