DB:5.14:Winbond National Semiconductor Tpm Trusted Platform Module Driver Not Installing Automatically In 64-Bit. 9c For those who might be having an issue with the Winbond (National Semiconductor) TPM (Hardware Ids: ACPI NSC1100) driver the following link worked for obtaining a driver that will install in Windows 7 64-bit. Trusted Platform Module is an international standard for a secure cryptoprocessor, a dedicated. Trusted Platform Module (TPM) was conceived by a computer industry. TCG has certified TPM chips manufactured by Infineon Technologies, Nuvoton. Apple never provided an official driver, but there was a port under GPL.
Components of a Trusted Platform Module complying with the TPM version 1.2 standard
Trusted Platform Module (TPM, also known as ISO/IEC 11889) is an international standard for a secure cryptoprocessor, a dedicated microcontroller designed to secure hardware through integrated cryptographic keys.
History[edit]
Trusted Platform Module (TPM) was conceived by a computer industry consortium called Trusted Computing Group (TCG), and was standardized by International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC) in 2009 as ISO/IEC 11889.[1]
TCG continued to revise the TPM specifications. The last revised edition of TPM Main Specification Version 1.2 was published on March 3, 2011. It consisted of three parts, based on their purpose.[2] For the second major version of TPM, however, TCG released TPM Library Specification 2.0, which builds upon the previously published TPM Main Specification. Its latest edition was released on September 29, 2016, with several errata with the latest one being dated on January 8, 2018.[3][4]
Overview[edit]
Trusted Platform Module provides
Computer programs can use a TPM to authenticate hardware devices, since each TPM chip has a unique and secret RSA key burned in as it is produced. Pushing the security down to the hardware level provides more protection than a software-only solution.[9]
Uses[edit]![]()
The United States Department of Defense (DoD) specifies that 'new computer assets (e.g., server, desktop, laptop, thin client, tablet, smartphone, personal digital assistant, mobile phone) procured to support DoD will include a TPM version 1.2 or higher where required by DISASTIGs and where such technology is available.' DoD anticipates that TPM is to be used for device identification, authentication, encryption, and device integrity verification.[10]
Platform integrity[edit]
The primary scope of TPM is to assure the integrity of a platform. 24k magic full album download. In this context, 'integrity' means 'behave as intended', and a 'platform' is any computer device regardless of its operating system. It is to ensure that the boot process starts from a trusted combination of hardware and software, and continues until the operating system has fully booted and applications are running.
The responsibility of assuring said integrity using TPM is with the firmware and the operating system. For example, Unified Extensible Firmware Interface (UEFI) can use TPM to form a root of trust: The TPM contains several Platform Configuration Registers (PCRs) that allow secure storage and reporting of security relevant metrics. These metrics can be used to detect changes to previous configurations and decide how to proceed. Good examples can be found in Linux Unified Key Setup (LUKS),[11]BitLocker and PrivateCore vCage memory encryption. (See below.)
An example of TPM use for platform integrity is the Trusted Execution Technology (TXT), which creates a chain of trust. It could remotely attest that a computer is using the specified hardware and software.[12]
Disk encryption[edit]
Full disk encryption utilities, such as dm-crypt and BitLocker, can use this technology to protect the keys used to encrypt the computer's storage devices and provide integrity authentication for a trusted boot pathway that includes firmware and boot sector.
Password protection[edit]
Operating systems often require authentication (involving a password or other means) to protect keys, data or systems. If the authentication mechanism is implemented in software only, the access is prone to dictionary attacks. Since TPM is implemented in a dedicated hardware module, a dictionary attack prevention mechanism was built in, which effectively protects against guessing or automated dictionary attacks, while still allowing the user a sufficient and reasonable number of tries. Without this level of protection, only passwords with high complexity would provide sufficient protection.
Other uses and concerns[edit]
Any application can use a TPM chip for:
Other uses exist, some of which give rise to privacy concerns. The 'physical presence' feature of TPM addresses some of these concerns by requiring BIOS-level confirmation for operations such as activating, deactivating, clearing or changing ownership of TPM by someone who is physically present at the console of the machine.[14][15]
TPM implementations[edit]
Trusted Platform Module installed on a motherboard
Starting in 2006, many new laptops have been sold with a built-in TPM chip. In the future, this concept could be co-located on an existing motherboard chip in computers, or any other device where the TPM facilities could be employed, such as a cellphone. On a PC, either the LPC bus or the SPI bus is used to connect to the TPM chip.
TCG has certified TPM chips manufactured by Infineon Technologies, Nuvoton, and STMicroelectronics,[16] having assigned TPM vendor IDs to Advanced Micro Devices, Atmel, Broadcom, IBM, Infineon, Intel, Lenovo, National Semiconductor, Nationz Technologies, Nuvoton, Qualcomm, Rockchip, Standard Microsystems Corporation, STMicroelectronics, Samsung, Sinosun, Texas Instruments, and Winbond.[17]
There are five different types of TPM 2.0 implementations:[18][19]
TPM 1.2 vs TPM 2.0[edit]
While TPM 2.0 addresses many of the same use cases and has similar features, the details are different. TPM 2.0 is not backward compatible to TPM 1.2.[20]
The TPM 2.0 policy authorization includes the 1.2 HMAC, locality, physical presence, and PCR. It adds authorization based on an asymmetric digital signature, indirection to another authorization secret, counters and time limits, NVRAM values, a particular command or command parameters, and physical presence. It permits the ANDing and ORing of these authorization primitives to construct complex authorization policies.[33]
Criticism[edit]
TCG has faced resistance to the deployment of this technology in some areas, where some authors see possible uses not specifically related to Trusted Computing, which may raise privacy concerns. Download family feud for free unlimited play. The concerns include the abuse of remote validation of software (where the manufacturerâââand not the user who owns the computer systemâââdecides what software is allowed to run) and possible ways to follow actions taken by the user being recorded in a database, in a manner that is completely undetectable to the user.[34] Lorn acid rain mp3 download.
The TrueCrypt disk encryption utility, as well as its derivative VeraCrypt, do not support TPM. The original TrueCrypt developers were of the opinion that the exclusive purpose of the TPM is 'to protect against attacks that require the attacker to have administrator privileges, or physical access to the computer'. The attacker who has physical or administrative access to a computer can circumvent TPM, e.g., by installing a hardware keystroke logger, by resetting TPM, or by capturing memory contents and retrieving TPM-issued keys. As such, the condemning text goes so far as to claim that TPM is entirely redundant.[35] The VeraCrypt publisher has reproduced the original allegation with no changes other than replacing 'TrueCrypt' with 'VeraCrypt'.[36]
The private endorsement key is fundamental to the security of the TPM circuit, and is never made available to the end-user. This private key must be known to the hardware chip manufacturer at manufacture time, otherwise they would not be able to burn the key into the circuit. There are no guarantees that this private key is not kept by the manufacturer or shared with government agencies. Anyone with access to the private endorsement key would be able to forge the chip's identity and break some of the security that the chip provides. Thus, the security of the TPM relies entirely on the manufacturer and the authorities in the country where the hardware is produced.[original research?]
Attacks[edit]
In 2010, Christopher Tarnovsky presented an attack against TPMs at Black Hat Briefings, where he claimed to be able to extract secrets from a single TPM. He was able to do this after 6 months of work by inserting a probe and spying on an internal bus for the Infineon SLE 66 CL PC.[37][38]
In 2015, as part of the Snowden revelations, it was revealed that in 2010 a US CIA team claimed at an internal conference to have carried out a differential power analysis attack against TPMs that was able to extract secrets.[39][40]
2017 weak key generation controversy[edit]
In October 2017, it was reported that a code library developed by Infineon, which had been in widespread use in its TPMs, allowed RSA private keys to be inferred from public keys. As a result, all systems depending upon the privacy of such keys were vulnerable to compromise, such as identity theft or spoofing.[41]
Cryptosystems that store encryption keys directly in the TPM without blinding could be at particular risk to these types of attacks, as passwords and other factors would be meaningless if the attacks can extract encryption secrets.[42]
Availability[edit]
Currently TPM is used by nearly all PC and notebook manufacturers, primarily offered on professional product lines.
TPM is implemented by several vendors:
There are also hybrid types; for example, TPM can be integrated into an Ethernet controller, thus eliminating the need for a separate motherboard component.[62][63]
See also[edit]
References[edit]
Further reading[edit]Winbond Tpm 12 Security Controller Drivers
Winbond Tpm 12 Security Controller Driver Download
Retrieved from 'https://en.wikipedia.org/w/index.php?title=Trusted_Platform_Module&oldid=898950207'
Comments are closed.
|
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |