没有合适的资源?快使用搜索试试~ 我知道了~
首页TCG TPM2.0 安全模块架构规范
TCG TPM2.0 安全模块架构规范
需积分: 9 0 下载量 93 浏览量
更新于2024-07-09
收藏 3.62MB PDF 举报
"TCG_TPM2_r1p59_Part1_Architecture_pub.pdf"
本文档详细介绍了可信计算组(Trusted Computing Group, TCG)的可信平台模块(Trusted Platform Module, TPM)2.0规范的第一部分:架构。TPM2.0是一个安全芯片,用于提供计算机系统的信任根,确保平台的完整性,并支持各种安全功能。
在TPM2.0架构中,主要关注以下几个关键知识点:
1. **信任根(Root of Trust)**:TPM作为信任根,是系统安全性的重要基础。它提供了一个初始的信任基点,使得可以验证平台硬件、固件和软件的完整性和安全性。
2. **密钥管理**:TPM2.0规范包含对密钥的创建、存储和管理。它可以生成和保护密钥,防止非授权访问,这些密钥用于加密、身份验证和其他安全操作。
3. **PCR(Platform Configuration Registers)**:PCR是TPM中的一组寄存器,用于存储平台的测量值。每次系统启动或发生重要事件时,PCR会被更新,形成一个反映系统状态的哈希链,这为完整性度量提供了基础。
4. **固件和软件测量**:TPM可以测量引导加载程序、操作系统和其他关键软件组件,确保它们未被篡改。这些测量结果存储在PCR中,可被用于验证平台的完整性。
5. **认证和授权**:TPM2.0支持对象(如密钥)的认证和授权流程,确保只有经过验证的实体才能访问敏感数据或执行特定操作。
6. **安全启动**:TPM2.0有助于实现安全启动过程,通过验证引导链的每个阶段来防止恶意软件的注入。
7. **TPM命令与接口**:文档详细定义了TPM2.0支持的命令集,包括但不限于初始化、密钥操作、PCR管理和固件更新等。此外,还定义了与TPM交互的接口,如TPM命令协议(TPM Command Transport Protocol)。
8. **版权和许可**:文档中提到的源代码许可条款表明,用户有权复制、创建衍生作品、分发、展示和执行源代码,并可将这些权利授予他人。对于规范的非源代码部分,用户可以为了开发基于这些文档的产品而进行复制、分发、展示和执行。
9. **安全性考虑**:TPM2.0设计的目标是抵御物理攻击,例如芯片篡改和侧信道攻击。它还包含安全机制,如物理防护、安全存储和随机数生成,以增强整体安全性。
TPM2.0架构部分的这份文档是理解和实现基于该标准的安全系统的基石,它涵盖了从密钥管理到平台完整性验证的广泛安全功能。
Trusted Platform Module Library Part 1: Architecture
Page xvi TCG Published Family “2.0”
November 8, 2019 Copyright © TCG 2006-2020 Level 00 Revision 01.59
Contributors:
Loic Duflot; ANSSI
Frederic Guihery; AMOSSYS
Ralf Findeisen; AMD
Julian Hammersley; AMD
Dean Liberty; AMD
Ron Perez; AMD
Emily Ratliff; AMD
Gary Simpson; AMD
Gongyuan Zhuang; AMD
John Mersh; ARM Ltd.
Kerry Maletsky; Atmel
Randy Mummert; Atmel
Ronnie Thomas; Atmel
Douglas Allen; Broadcom
Chares Qi; Broadcom
Daniel Nowack; BSI
Florian Samson; BSI
Bill Lattin; Certicom
Matt Harvey; CESG
Paul Waller; CESG
Bob Bell; Cisco
Bill Jacobs; Cisco
Rafael Montalvo; Cisco
Frank Mosberry; Dell
Amy Nelson; Dell
Ari Singer; DMI
Sigrid Gürgens; Fraunhofer SIT
Andreas Fuchs: Fraunhofer SIT
Carsten Rudolph; Fraunhofer SIT
Carline Covey; Freescale Semiconductor
Ira McDonald; High North
Vali Ali; Hewlett Packard
Liqun Chen; Hewlett Packard
Carey Huscroft; Hewlett Packard
Wael Ibrahim; Hewlett Packard
Graeme Proudler; Hewlett Packard
Ken Goldman; IBM
Hans Brandl; Infineon
Hubert Braunwarth; Infineon
Ga-Wai Chin; Infineon
Roland Ebrecht; Infineon
Markus Gueller; Infineon
Ralph Hamm; Infineon
Georg Rankl; Infineon
Will Arthur; Intel
Ernie Brickell; Intel
Alex Eydelberg; Intel
David Grawrock; Intel
Jiangtao Li; Intel
David Riss; Intel
Ned Smith; Intel
Claire Vishik; Intel
Monty Wiseman; Intel
Igor Slutsker; Intel
Liran Perez; Intel
Zecharye Galitzky; Intel
Joshua Su; ITE
David Challener; Johns Hopkins APL
Huang Qian; Lenovo
Ronald Aigner; Microsoft
Jing De Jong-Chen; Microsoft
Shon Eizenhoefer; Microsoft
Carl Ellison; Microsoft
Paul England; Microsoft
Leonard Janke; Microsoft
Richard Korry; Microsoft
Jork Loeser; Microsoft
Andrey Marochko; Microsoft
Jim Morgan; Microsoft
Dennis Mattoon; Microsoft
Himanshu Raj; Microsoft
David Robinson; Microsoft
Rob Spiger; Microsoft
Stefan Thom; Microsoft
Mark Williams; Microsoft
David Wooten; Microsoft
Jiajing Zhu; Microsoft
Luis Samenta; MIT
Ariel Segall; MITRE
Nataly Kremer; M-Systems Flash
Andrew Regenscheid; NIST
Qin Fan; Nationz
Jay Liang; Nationz
Xin Liu; Nationz
Jan-Erik Ekberg; Nokia
Michael Cox; NTRU
Nick Howgrave-Graham; NTRU
William Whyte; NTRU
Leooid Asriel; Nuvoton
Dan Morav; Nuvoton
Erez Naory; Nuvoton
Oren Tanami; Nuvoton
Dennis Huage; NVIDIA
Whllys Ingersoll; Oracle
Scott Rotondo; Oracle
Timothy Markey; Phoenix
Anders Rundgren; PrimeKey Solutions
Laszlo Elteto; Safenet
Michael Willet; Seagate
Olivier Collart; STMicroelectronics
Miroslav Dusek; STMicroelectronics
Jan Smrcek; STMicroelectronics
Mohamed Tabet; STMicroelectronics
Paul Sangster; Symantec
Jerome Quevremont; Thales
Mark Ryan; University of Birmingham
Mike Boyle; US Department of Defense
Stanley Potter; US Department of Defense
Sandi Roddy; US Department of Defense
Adrian Stanger; US Department of Defense
Kelvin Li; VIA
Nick Bone; Vodafone
Mihran Dars; Wave Systems
Thomas Hardjono; Wave Systems
Greg Kazmierczak; Wave Systems
Len Veil; Wave Systems
Part 1: Architecture Trusted Platform Module Library
Family “2.0” TCG Published Page xvii
Level 00 Revision 01.59 Copyright © TCG 2006-2020 November 8, 2019
CONTENTS
Scope .................................................................................................................................................... 1
Specification Organization..................................................................................................................... 2
Normative references ............................................................................................................................ 3
Terms and definitions ............................................................................................................................ 4
Symbols and Abbreviated Terms ........................................................................................................ 14
5.1 Symbols ........................................................................................................................................ 14
5.2 Abbreviations ................................................................................................................................ 14
Compliance ......................................................................................................................................... 17
Conventions ........................................................................................................................................ 18
7.1 Bit and Octet Numbering and Order ............................................................................................. 18
7.2 Sized Buffer References ............................................................................................................... 18
7.3 Numbers ....................................................................................................................................... 18
Changes from Previous Versions ........................................................................................................ 20
Trusted Platforms ................................................................................................................................ 21
9.1 Trust .............................................................................................................................................. 21
9.2 Trust Concepts.............................................................................................................................. 21
Trusted Building Block .......................................................................................................... 21
Trusted Computing Base...................................................................................................... 21
Trust Boundaries .................................................................................................................. 21
Transitive Trust ..................................................................................................................... 22
Trust Authority ...................................................................................................................... 22
9.3 Trusted Platform Module .............................................................................................................. 23
9.4 Roots of Trust ............................................................................................................................... 23
Root of Trust for Measurement (RTM) ................................................................................. 24
Root of Trust for Storage (RTS) ........................................................................................... 24
Root of Trust for Reporting (RTR) ........................................................................................ 24
9.5 Basic Trusted Platform Features .................................................................................................. 25
Introduction ........................................................................................................................... 25
Certification .......................................................................................................................... 25
Attestation and Authentication ............................................................................................. 26
Protected Location ............................................................................................................... 29
Integrity Measurement and Reporting .................................................................................. 29
TPM Protections .................................................................................................................................. 31
10.1 Introduction ................................................................................................................................... 31
10.2 Protection of Protected Capabilities.............................................................................................. 31
10.3 Protection of Shielded Locations .................................................................................................. 31
10.4 Exceptions and Clarifications ........................................................................................................ 31
TPM Architecture ................................................................................................................................. 33
11.1 Introduction ................................................................................................................................... 33
11.2 TPM Command Processing Overview .......................................................................................... 33
11.3 I/O Buffer ....................................................................................................................................... 37
11.4 Cryptography Subsystem ............................................................................................................. 37
Trusted Platform Module Library Part 1: Architecture
Page xviii TCG Published Family “2.0”
November 8, 2019 Copyright © TCG 2006-2020 Level 00 Revision 01.59
Introduction ........................................................................................................................... 37
Symmetric Block Cipher MAC Algorithms ............................................................................ 37
Hash Functions .................................................................................................................... 37
HMAC Algorithm ................................................................................................................... 38
Asymmetric Operations ........................................................................................................ 38
Signature Operations ........................................................................................................... 39
Symmetric Encryption .......................................................................................................... 41
Extend .................................................................................................................................. 42
Key Generation .................................................................................................................... 43
Key Derivation Function ....................................................................................................... 43
Random Number Generator (RNG) Module ........................................................................ 47
Algorithms ............................................................................................................................ 49
11.5 Authorization Subsystem .............................................................................................................. 50
11.6 Random Access Memory .............................................................................................................. 50
Introduction ........................................................................................................................... 50
Platform Configuration Registers (PCR) .............................................................................. 50
Object Store ......................................................................................................................... 51
Session Store ....................................................................................................................... 52
Size Requirements ............................................................................................................... 52
11.7 Non-Volatile (NV) Memory ............................................................................................................ 52
11.8 Power Detection Module ............................................................................................................... 53
TPM Operational States ...................................................................................................................... 54
12.1 Introduction ................................................................................................................................... 54
12.2 Basic TPM Operational States ...................................................................................................... 54
Power-off State ..................................................................................................................... 54
Initialization State ................................................................................................................. 54
Startup State ........................................................................................................................ 55
Shutdown State .................................................................................................................... 57
Startup Alternatives .............................................................................................................. 58
12.3 Self-Test Modes ............................................................................................................................ 59
12.4 Failure Mode ................................................................................................................................. 60
12.5 Field Upgrade ............................................................................................................................... 61
Introduction ........................................................................................................................... 61
Field Upgrade Mode ............................................................................................................. 61
Preserved TPM State ........................................................................................................... 64
Field Upgrade Implementation Options ................................................................................ 65
TPM Control Domains ......................................................................................................................... 66
13.1 Introduction ................................................................................................................................... 66
13.2 Controls ......................................................................................................................................... 66
13.3 Platform Controls .......................................................................................................................... 67
13.4 Owner Controls ............................................................................................................................. 68
13.5 Privacy Administrator Controls ..................................................................................................... 68
13.6 Primary Seed Authorizations ........................................................................................................ 69
13.7 Lockout Control ............................................................................................................................. 69
13.8 TPM Ownership ............................................................................................................................ 70
Taking Ownership ................................................................................................................ 70
Part 1: Architecture Trusted Platform Module Library
Family “2.0” TCG Published Page xix
Level 00 Revision 01.59 Copyright © TCG 2006-2020 November 8, 2019
Releasing Ownership ........................................................................................................... 70
Primary Seeds ..................................................................................................................................... 72
14.1 Introduction ................................................................................................................................... 72
14.2 Rationale ....................................................................................................................................... 72
14.3 Primary Seed Properties ............................................................................................................... 73
Introduction ........................................................................................................................... 73
Endorsement Primary Seed (EPS) ...................................................................................... 74
Platform Primary Seed (PPS)............................................................................................... 74
Storage Primary Seed (SPS) ............................................................................................... 75
The Null Seed ....................................................................................................................... 75
14.4 Hierarchy Proofs ........................................................................................................................... 75
TPM Handles ....................................................................................................................................... 77
15.1 Introduction ................................................................................................................................... 77
15.2 PCR Handles (MSO=00
16
) ............................................................................................................ 77
15.3 NV Index Handles (MSO=01
16
) .................................................................................................... 77
15.4 Session Handles (MSO=02
16
and 03
16
) ........................................................................................ 77
15.5 Permanent Resource Handles (MSO=40
16
) ................................................................................. 78
15.6 Transient Object Handles (MSO=80
16
) ......................................................................................... 78
15.7 Persistent Object Handles (MSO=81
16
) ........................................................................................ 79
Names ................................................................................................................................................. 80
PCR Operations .................................................................................................................................. 81
17.1 Initializing PCR.............................................................................................................................. 81
17.2 Extend of a PCR ........................................................................................................................... 81
17.3 Using Extend with PCR Banks ..................................................................................................... 81
17.4 Recording Events ......................................................................................................................... 82
17.5 Selecting Multiple PCR ................................................................................................................. 82
17.6 Reporting on PCR ......................................................................................................................... 83
Reading PCR ....................................................................................................................... 83
Attesting to PCR ................................................................................................................... 83
17.7 PCR Authorizations ...................................................................................................................... 84
PCR Not in a Set .................................................................................................................. 84
Authorization Set .................................................................................................................. 84
Policy Set ............................................................................................................................. 85
Order of Checking ................................................................................................................ 85
17.8 PCR Allocation .............................................................................................................................. 85
17.9 PCR Change Tracking .................................................................................................................. 86
17.10 Other Uses for PCR ...................................................................................................................... 86
TPM Command/Response Structure .................................................................................................. 87
18.1 Introduction ................................................................................................................................... 87
18.2 Command/Response Header Fields ............................................................................................ 88
tag ......................................................................................................................................... 89
commandSize/responseSize ................................................................................................ 89
commandCode ..................................................................................................................... 89
responseCode ...................................................................................................................... 89
Trusted Platform Module Library Part 1: Architecture
Page xx TCG Published Family “2.0”
November 8, 2019 Copyright © TCG 2006-2020 Level 00 Revision 01.59
18.3 Handles ......................................................................................................................................... 89
18.4 Parameters ................................................................................................................................... 90
18.5 authorizationSize/parameterSize .................................................................................................. 90
18.6 Authorization Area ........................................................................................................................ 91
Introduction ........................................................................................................................... 91
Authorization Structure ......................................................................................................... 92
Session Handles .................................................................................................................. 93
Session Attributes (sessionAttributes) ................................................................................. 93
18.7 Command Parameter Hash (cpHash) .......................................................................................... 95
18.8 Response Parameter Hash (rpHash) ........................................................................................... 96
18.9 Command Example ...................................................................................................................... 96
18.10 Response Example ....................................................................................................................... 98
Authorizations and Acknowledgments ................................................................................................ 99
19.1 Introduction ................................................................................................................................... 99
19.2 Authorization Roles ....................................................................................................................... 99
19.3 Physical Presence Authorization ................................................................................................ 100
19.4 Password Authorizations ............................................................................................................ 101
19.5 Sessions ..................................................................................................................................... 102
19.6 Session-Based Authorizations .................................................................................................... 102
Introduction ......................................................................................................................... 102
Authorization Session Formats .......................................................................................... 103
Session Nonces ................................................................................................................. 103
Authorization Values .......................................................................................................... 105
HMAC Computation ........................................................................................................... 105
Note on Use of Nonces in HMAC Computations ............................................................... 107
Starting an Authorization Session ...................................................................................... 107
sessionKey Creation .......................................................................................................... 108
Unbound and Unsalted Session Key Generation .............................................................. 108
Bound Session Key Generation ......................................................................................... 109
Salted Session Key Generation ......................................................................................... 112
Salted and Bound Session Key Generation ....................................................................... 113
Encryption of salt ................................................................................................................ 114
Caution on use of Unsalted Authorization Sessions .......................................................... 114
No HMAC Authorization ..................................................................................................... 115
Authorization Selection Logic for Objects .......................................................................... 115
Authorization Session Termination .................................................................................... 116
19.7 Enhanced Authorization .............................................................................................................. 116
Introduction ......................................................................................................................... 116
Policy Assertion .................................................................................................................. 117
Policy AND ......................................................................................................................... 117
Policy OR............................................................................................................................ 119
Order of Evaluation ............................................................................................................ 121
Policy Session Creation ..................................................................................................... 121
Policy Assertions (Policy Commands) ............................................................................... 122
Policy Session Context Values .......................................................................................... 125
Policy Example ................................................................................................................... 127
Trial Policy .......................................................................................................................... 127
Modification of Policies ....................................................................................................... 127
剩余305页未读,继续阅读
点击了解资源详情
点击了解资源详情
点击了解资源详情
2020-12-01 上传
2023-08-01 上传
2023-07-21 上传
2023-07-21 上传
2023-07-21 上传
2023-07-21 上传
aaaMBWQ
- 粉丝: 0
- 资源: 26
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功