module 7-2 :可信賴電腦

35
7-1 Module 7-2 Module 7-2 可可可可可 可可可可可 • 簡簡 • 簡簡簡簡簡簡簡簡簡 • 簡簡簡簡簡簡簡簡 • 簡簡簡簡簡簡簡簡 – TCG 簡簡簡簡簡簡簡簡簡簡簡簡簡簡簡 – Microsoft 簡簡簡簡簡簡簡簡簡簡 • 簡簡簡簡簡簡簡簡簡 • 簡簡簡簡簡簡簡簡簡 – TPM 簡簡簡簡 – 簡簡 TPM 簡簡簡簡簡 – TPM 簡簡簡簡簡簡 • 簡簡簡簡簡簡簡簡簡

Upload: buckminster-ward

Post on 03-Jan-2016

127 views

Category:

Documents


0 download

DESCRIPTION

Module 7-2 :可信賴電腦. 簡介 可信賴電腦發展歷程 可信賴電腦的概念 可信賴的安全功能 TCG 組織的可信賴電腦概念及相關規範 Microsoft 公司的可信賴電腦概念 可信賴電腦運作模式 可信賴平台模組簡介 TPM模組架構 使用 TPM 晶片的系統 TPM 模組服務功能 可信賴電腦發展現況. 簡介 (1/2). 可信賴電腦簡介 (Trusted Computing Platform) 在數位的網路化潮流下,一個合適的、安全的資訊運作平台將使我們在工作或生活上能夠平穩、順暢,而不會因為 平台的失常或是錯誤資訊而導致損害. 簡介 (2/2). - PowerPoint PPT Presentation

TRANSCRIPT

  • 7-*Module 7-2TCG Microsoft TPMTPMTPM

  • 7-* (1/2) (Trusted Computing Platform)

  • 7-* (2/2)

  • 7-* (1/5)1972 Anderson1983 (Trusted Computing Base; TCB)

  • 7-* (2/5)(Trusted Network Interpretation)(Computer Security Subsystem Interpretation)(Trusted Database Interpretation)

  • 7-* (3/5)1991 (Information Technology Security Evaluation Criteria; ITSEC)(Confidentiality)(Integrity)(Availability)

  • 7-* (4/5)1999 IntelIBMHPCompaq Microsoft (Trusted Computing Platform Alliance; TCPA) 2002(TCG 2003TCPA (Trusted Computing Group; TCG)

  • 7-* (5/5)2002Microsoft(Trustworthy Computing)2005 Microsoft Windows Vista(Longhorn)(TPM)

  • 7-*TCPA TCG

  • 7-* (I/O Port)

  • 7-*ISO/IEC 15408

  • 7-*TCG (1/2)TCG

    (Confidentiality)

    (Authentication)

    (Integrity)

  • 7-*TCG (2/2)TCPATCPA (TCPA Main Specification)(Trusted Platform Module; TPM)2003 TCG TCG Software Stack 1.1 (TSS 1.1)

  • 7-*Microsoft (1/2)

    (Security)

    (Reliability)

    (Business Integrity)

    (Privacy)

  • 7-*Microsoft (2/2)

  • 7-*TCG TCPA (Digital Rights Management; DRM)(Mandatory Access Control; MAC)

  • 7-*

  • 7-*TCG

  • 7-*

  • 7-*

    CPU

    Display

    Controller

    RAM

    RemovableDevices

    EmbeddedDevices

    Boot ROM

    TPM

  • 7-*

  • 7-*TPMTCGTPMhttp://www.pconline.com.cn/notebook/skill/experience/0607/pic/TPM_Snap3_01_0717.jpg

  • 7-*TPMTPM Wrapping KeyBinding KeyTPM SRK (Storage Root Key)TPMhttp://member.digitimes.com.tw/newsimage/060213160ee6_0.gif

  • 7-*TPM (1/3)

  • 7-*TPM (2/3)TPM WMI (Group Policy)(Easy Deployment and Decommissioning)

  • 7-*TPM (3/3)Windows VistaTPM TPM

    Microsoft Windows Vista

  • 7-* (1/3)TCG TPM TPM AtmelBroadcomInfineonWinbond ElectronicsSinosun STMicroelectronics 2006Windows Vista

    Microsoft Windows Vista

  • 7-* (2/3)

  • 7-* (3/3)

  • Linux -- iptables , Robert L. Ziegler, , ISBN 986752969-3

    http://www.csie.nctu.edu.tw/~skhuang/soft-sec.htm

    http://www.csie.nctu.edu.tw/~skhuang/

    http://www.symantec.com/region/tw/enterprise/article/client/security.html

    http://linuxweb.tccn.edu.tw/NewUpgrade

    http://ics.stpi.org.tw/Treatise/doc/12.pdf 7-*

  • (Timing Attack) http://www2.nsysu.edu.tw/cc/20050829.pdf

    Linux Server Hacks , Rob Flickenger , , , OREILLY , ISBN 986-7794-19-2

    Linux , , , ISBN 986-7961-74-9

    Linux ,,, , , , ISBN 957-442-111-2

    UNIX INTERNET , Simon Garfinkel & Gene Spafford , ,, , OREILLY , ISBN 957-8247-60-5

    Web http://www.sinica.edu.tw/as/advisory/journal/13-2/101-105.pdf 7-*

  • 7-*SANS Network Security Roadmap, 8th Edition, 2003, http://www.sans.org.Bruce Schneier, Applied Cryptography, 2nd Ed., 1996.Charles P. Pfleeger, Security in Computing, 2nd Ed., 1997.Dorothy E. Denning, Information Warfare and Security, Addison-Wesley, 1999.Dieter Gollmann, Computer Security, Wiley, 1999.William Stallings, Cryptography and Network Security: Principles and Practices, 4th Ed., Prentice Hall, 2006.

  • 7-*9291Color Petri Net906D. Evans and D. Larochelle, Improving Security Using Extensible Lightweight Static Analysis, IEEE Software Magazine, Vol. 19, No. 1, 2002, pp.42-51.W. Stackpole, Security Realities in Software Development, Computer Security Journal, Vol. 8, No. 1, 2002, pp. 9-14.

  • 7-*92897-27e89D. G. Abraham, G. M. Dolan, G. P. Double, and J. V. Stevens, Transaction Security System, IBM Systems Journal, Vol. 30, No. 2, 1991, pp. 206-229.Security Requirements for Cryptographic Modules, FIPS PUB 140-2, May 2001, http://csrc.nist.gov/publications/fips/fips140-2/

  • 7-*919294Trusted Computing Group, TCG Specification Architecture Overview, Revision 1.2, Apr. 28 2004.Microsoft Incorporated, Trusted Platform Module Services in Windows Longhorn, WinHEC 2005 Version, Apr. 25 2005.

    *

    **1997(Trusted Network Interpretation)(Computer Security Subsystem Interpretation)(Trusted Database Interpretation)*****(I/O Port)**TCPA (Confidentiality)(Authentication)(Integrity)

    *TPM TSS TPM TPM TPM

    *(Security)(Reliability)(Business Integrity)(Privacy)

    * (Fair Information Principle) (Manageability) (Accuracy) (Usability) (Responsiveness) (Transparency)

    (Fair Information Principle)(Availability)(Manageability)(Accuracy)(Usability)(Responsiveness)(Transparency)

    **TPMTPM

    **(I/O)(Non-volatile Storage)(Platform Configuration Register, PCR)(Attestation Identity Key, AIK)(Program Code)(Random Number Generator, RNG)SHA-1RSARSAOpt-InTCGTPM(Execution Engine)

    ***