### Automated Proof for Authorization Protocols of TPM 2.0 in Computational Model (full version)

Weijin Wang, Yu Qin, Dengguo Feng, and Xiaobo Chu

##### Abstract

We present the first automated proof of the authorization protocols in TPM 2.0 in the computational model. The Trusted Platform Module(TPM) is a chip that enables trust in computing platforms and achieves more security than software alone. The TPM interacts with a caller via a predefined set of commands. Many commands reference TPM-resident structures, and use of them may require authorization. The TPM will provide an acknowledgement once receiving an authorization. This interact ensure the authentication of TPM and the caller. In this paper, we present a computationally sound mechanized proof for authorization protocols in the TPM 2.0. We model the authorization protocols using a probabilistic polynomial-time calculus and prove authentication between the TPM and the caller with the aid of the tool CryptoVerif, which works in the computational model. In addition, the prover gives the upper bounds to break the authentication between them.

Available format(s)
Category
Cryptographic protocols
Publication info
Published elsewhere. MINOR revision.ISPEC2014
Keywords
TPMTrusted Computingformal methodscomputational modelauthorization
Contact author(s)
wangweijin @ tca iscas ac cn
History
2014-03-03: last of 2 revisions
See all versions
Short URL
https://ia.cr/2014/120

CC BY

BibTeX

@misc{cryptoeprint:2014/120,
author = {Weijin Wang and Yu Qin and Dengguo Feng and Xiaobo Chu},
title = {Automated Proof for Authorization Protocols of TPM 2.0 in Computational Model (full version)},
howpublished = {Cryptology ePrint Archive, Paper 2014/120},
year = {2014},
note = {\url{https://eprint.iacr.org/2014/120}},
url = {https://eprint.iacr.org/2014/120}
}

Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.