Symmetric Identity Based Device Attestation
Symmetric Identity Based Device Attestation | Version 1.0 | Revision 0.95 | 1/7/2020 | PUBLISHED Page 2 © TCG 2020
CONTENTS
DISCLAIMERS, NOTICES, AND LICENSE TERMS ..................................................................................................... 1
1 DOCUMENT SCOPE ............................................................................................................................................. 3
1.1 Key Words ....................................................................................................................................................... 3
1.2 Statement Type ............................................................................................................................................... 3
2 TERMS AND DEFINITIONS ................................................................................................................................... 4
3 ACRONYMS ........................................................................................................................................................... 5
4 INTRODUCTION .................................................................................................................................................... 6
4.1 Symmetric Cryptography ................................................................................................................................ 6
5 ARCHITECTURE .................................................................................................................................................... 7
5.1 Basic Attestation Protocol ............................................................................................................................... 7
5.2 TLS-PSK Based Attestation Protocol ............................................................................................................. 9
5.3 Provisioning................................................................................................................................................... 10
5.4 Delegation of Verification .............................................................................................................................. 11
5.5 Using Attestation Protocols in Upper Layers of DICE Hierarchy ................................................................. 11
6 References ............................................................................................................................................................ 13
7 Background ........................................................................................................................................................... 14
7.1 Device Identifier Composition Engine ........................................................................................................... 14
7.1.1 Purpose ............................................................................................................................................... 14
7.1.2 Unique Device Secret (UDS) ............................................................................................................... 14
7.1.3 Compound Device Identifier (CDI) ...................................................................................................... 14
7.1.4 Implementation .................................................................................................................................... 14