Institute of Computing Technology, Chinese Academy IR
A comprehensive formal security analysis and revision of the two-phase key exchange primitive of TPM 2.0 | |
Zhang, Qianying1,3,4; Zhao, Shijun2 | |
2020-10-09 | |
发表期刊 | COMPUTER NETWORKS |
ISSN | 1389-1286 |
卷号 | 179页码:18 |
摘要 | The Trusted Platform Module (TPM) version 2.0 provides a two-phase key exchange primitive which can be used to implement three widely-standardized authenticated key exchange protocols: the Full Unified Model, the Full MQV, and the SM2 key exchange protocols. However, vulnerabilities have been found in all of these protocols. Fortunately, it seems that the protections offered by TPM chips can mitigate these vulnerabilities. In this paper, we present a security model which captures TPM's protections on keys and protocols' computation environments and in which multiple protocols can be analyzed in a unified way. Based on the unified security model, we give the first formal security analysis of the key exchange primitive of TPM 2.0, and the analysis results show that, with the help of hardware protections of TPM chips, the key exchange primitive indeed satisfies the welldefined security property of our security model, but unfortunately under some impractical limiting conditions, which would prevent the application of the key exchange primitive in real-world networks. To make TPM 2.0 applicable to real-world networks, we present a revision of the key exchange primitive of TPM 2.0, which can be secure without the limiting conditions. We give a rigorous analysis of our revision, and the results show that our revision achieves not only the basic security property of modern AKE security models but also some further security properties. |
关键词 | Security analysis Authenticated key exchange TPM 2.0 |
DOI | 10.1016/j.comnet.2020.107369 |
收录类别 | SCI |
语种 | 英语 |
资助项目 | National Natural Science Foundation of China[61802375] ; National Natural Science Foundation of China[61602325] ; National Natural Science Foundation of China[61876111] ; National Natural Science Foundation of China[61877040] ; Project of Beijing Municipal Education Commission[KM20190028005] ; Open Research Fund of State Key Laboratory of Computer Architecture, ICT, CAS[CARCH201920] |
WOS研究方向 | Computer Science ; Engineering ; Telecommunications |
WOS类目 | Computer Science, Hardware & Architecture ; Computer Science, Information Systems ; Engineering, Electrical & Electronic ; Telecommunications |
WOS记录号 | WOS:000571930100003 |
出版者 | ELSEVIER |
引用统计 | |
文献类型 | 期刊论文 |
条目标识符 | http://119.78.100.204/handle/2XEOYT63/15579 |
专题 | 中国科学院计算技术研究所期刊论文_英文 |
通讯作者 | Zhao, Shijun |
作者单位 | 1.Capital Normal Univ, Coll Informat Engn, Beijing, Peoples R China 2.Huawei Technol Co Ltd, Shenzhen, Peoples R China 3.Beijing Engn Res Ctr High Reliable Embedded Syst, Beijing, Peoples R China 4.Chinese Acad Sci, Inst Comp Technol, State Key Lab Comp Architecture, Beijing, Peoples R China |
推荐引用方式 GB/T 7714 | Zhang, Qianying,Zhao, Shijun. A comprehensive formal security analysis and revision of the two-phase key exchange primitive of TPM 2.0[J]. COMPUTER NETWORKS,2020,179:18. |
APA | Zhang, Qianying,&Zhao, Shijun.(2020).A comprehensive formal security analysis and revision of the two-phase key exchange primitive of TPM 2.0.COMPUTER NETWORKS,179,18. |
MLA | Zhang, Qianying,et al."A comprehensive formal security analysis and revision of the two-phase key exchange primitive of TPM 2.0".COMPUTER NETWORKS 179(2020):18. |
条目包含的文件 | 条目无相关文件。 |
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。
修改评论