Cryptology ePrint Archive: Report 2015/611

A Unified Security Analysis of Two-phase Key Exchange Protocols in TPM 2.0

Shijun Zhao and Qianying Zhang

Abstract: The Trusted Platform Module (TPM) version 2.0 provides an authenticated key exchange functionality by a single key exchange primitive, which can be called to implement three key exchange protocols (denoted as two-phase key exchange protocols in TPM 2.0): the Full Unified Model, the MQV, and the SM2 key exchange protocols. However, some vulnerabilities have been found in all of these protocols. Fortunately, it seems that protections provided by the TPM can deal with vulnerabilities of these protocols. This paper investigates whether the TPM key exchange primitive provides a secure key exchange functionality under protections of the TPM. We first perform an informal analysis of the TPM key exchange primitive which helps us to model in a precise way. Then we formally analyze the TPM key exchange primitive in a security model for AKE, based on which all the protocols adopted by TPM 2.0 can be analyzed in a unified way. Our analysis indicates under what conditions the TPM 2.0 can provide a provable secure key exchange functionality. In the end, we give suggestions on how to leverage the TPM key exchange primitive properly, and suggestions on how to improve the security of current TPM key exchange primitive to enable its wide use in practice.

Category / Keywords: cryptographic protocols / Authenticated Key Exchange, Security Model, Security Analysis, Min-entropy, TPM 2.0

Original Publication (with major differences): Trust'15

Date: received 21 Jun 2015

Contact author: zqyzsj at gmail com

Available format(s): PDF | BibTeX Citation

Version: 20150628:193720 (All versions of this report)

Short URL: ia.cr/2015/611

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]