BS ISO IEC 11889-2-2009 Information technology - Trusted platform module - Design principles《信息技术 信任平台模型 设计原则》.pdf
《BS ISO IEC 11889-2-2009 Information technology - Trusted platform module - Design principles《信息技术 信任平台模型 设计原则》.pdf》由会员分享,可在线阅读,更多相关《BS ISO IEC 11889-2-2009 Information technology - Trusted platform module - Design principles《信息技术 信任平台模型 设计原则》.pdf(156页珍藏版)》请在麦多课文档分享上搜索。
1、BS ISO/IEC 11889-2:2009 Incorporating Corrigendum August 2009 ICS 35.040 NO COPYING WITHOUT BSI PERMISSION EXCEPT AS PERMITTED BY COPYRIGHT LAW BRITISH STANDARD Information technology Trusted Platform Module Part 2: Design principlesThis British Standard was published under the authority of the Stan
2、dards Policy and Strategy Committee on 30 June 2009. BSI 2009 ISBN 978 0 580 68271 1 Amendments/corrigenda issued since publication Date Comments BS ISO/IEC 11889-2:2009 National foreword This British Standard is the UK implementation of ISO/IEC 11889-2:2009. The UK participation in its preparation
3、was entrusted to Technical Committee IST/33, IT - Security techniques. A list of organizations represented on this committee can be obtained on request to its secretary. This publication does not purport to include all the necessary provisions of a contract. Users are responsible for its correct app
4、lication. Compliance with a British Standard cannot confer immunity from legal obligations. 31 August 2009 Correction to BS identifier Reference number ISO/IEC 11889-2:2009(E) ISO/IEC 2009INTERNATIONAL STANDARD ISO/IEC 11889-2 First edition 2009-05-15 Information technology Trusted Platform Module P
5、art 2: Design principles Technologies de linformation Module de plate-forme de confiance Partie 2: Principes de conception ISO/IEC 11889-2:2009(E) PDF disclaimer This PDF file may contain embedded typefaces. In accordance with Adobes licensing policy, this file may be printed or viewed but shall not
6、 be edited unless the typefaces which are embedded are licensed to and installed on the computer performing the editing. In downloading this file, parties accept therein the responsibility of not infringing Adobes licensing policy. The ISO Central Secretariat accepts no liability in this area. Adobe
7、 is a trademark of Adobe Systems Incorporated. Details of the software products used to create this PDF file can be found in the General Info relative to the file; the PDF-creation parameters were optimized for printing. Every care has been taken to ensure that the file is suitable for use by ISO me
8、mber bodies. In the unlikely event that a problem relating to it is found, please inform the Central Secretariat at the address given below. COPYRIGHT PROTECTED DOCUMENT ISO/IEC 2009 All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any for
9、m or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from either ISO at the address below or ISOs member body in the country of the requester. ISO copyright office Case postale 56 CH-1211 Geneva 20 Tel. + 41 22 749 01 11 Fax + 41 22 749 09
10、47 E-mail copyrightiso.org Web www.iso.org Published in Switzerland ii ISO/IEC 2009 All rights reservedBS ISO/IEC 11889-2:2009ISO/IEC 11889-2:2009(E) ISO/IEC 2009 All rights reserved iiiTable of Contents 1. Scope 1 1.1 Key words 1 1.2 Statement Type 1 2. Normative references 2 3. Abbreviated Terms 3
11、 4. Conformance 5 4.1 Introduction 5 4.2 Threat 6 4.3 Protection of functions 6 4.4 Protection of information 6 4.5 Side effects 7 4.6 Exceptions and clarifications 7 5. TPM Architecture 8 5.1 Interoperability 8 5.2 Components 8 5.2.1 Input and Output 9 5.2.2 Cryptographic Co-Processor 9 5.2.3 Key G
12、eneration 11 5.2.4 HMAC Engine 12 5.2.5 Random Number Generator 13 5.2.6 SHA-1 Engine 15 5.2.7 Power Detection 16 5.2.8 Opt-In 16 5.2.9 Execution Engine 17 5.2.10 Non-Volatile Memory 17 5.3 Data Integrity Register (DIR) 18 5.4 Platform Configuration Register (PCR) 18 6. Endorsement Key Creation 20 6
13、.1 Controlling Access to PRIVEK 21 6.2 Controlling Access to PUBEK 21 7. Attestation Identity Keys 22 8. TPM Ownership 23 8.1 Platform Ownership and Root of Trust for Storage 23 9. Authentication and Authorization Data 24 9.1 Dictionary Attack Considerations 25 10. TPM Operation 26 10.1 TPM Initiali
14、zation & Operation State Flow 27 10.1.1 Initialization 27 BS ISO/IEC 11889-2:2009ISO/IEC 11889-2:2009(E) iv ISO/IEC 2009 All rights reserved10.2 Self-Test Modes 28 10.2.1 Operational Self-Test 29 10.3 Startup 32 10.4 Operational Mode 33 10.4.1 Enabling a TPM 34 10.4.2 Activating a TPM 35 10.4.3 Taki
15、ng TPM Ownership 36 10.4.4 Transitioning Between Operational States 38 10.5 Clearing the TPM 38 11. Physical Presence 40 12. Root of Trust for Reporting (RTR) 42 12.1 Platform Identity 42 12.2 RTR to Platform Binding 43 12.3 Platform Identity and Privacy Considerations 43 12.4 Attestation Identity K
16、eys 43 12.4.1 AIK Creation 44 12.4.2 AIK Storage 45 13. Root of Trust for Storage (RTS) 46 13.1 Loading and Unloading Blobs 46 14. Transport Sessions and Authorization Protocols 47 14.1 Authorization Session Setup 48 14.2 Parameter Declarations for OIAP and OSAP Examples 50 14.2.1 Object-Independent
17、 Authorization Protocol (OIAP) 52 14.2.2 Object-Specific Authorization Protocol (OSAP) 56 14.3 Authorization Session Handles 59 14.4 Authorization-Data Insertion Protocol (ADIP) 60 14.5 AuthData Change Protocol (ADCP) 64 14.6 Asymmetric Authorization Change Protocol (AACP) 65 15. ISO/IEC 19790 Evalu
18、ations 66 15.1 TPM Profile for successful ISO/IEC 19790 evaluation 66 16. Maintenance 67 16.1 Field Upgrade 69 17. Proof of Locality 70 18. Monotonic Counter 71 19. Transport Protection 74 19.1 Transport encryption and authorization 75 19.1.1 MGF1 parameters 77 19.1.2 HMAC calculation 78 19.1.3 Tran
19、sport log creation 78 19.1.4 Additional Encryption Mechanisms 78 BS ISO/IEC 11889-2:2009ISO/IEC 11889-2:2009(E) ISO/IEC 2009 All rights reserved v19.2 Transport Error Handling 79 19.3 Exclusive Transport Sessions 79 19.4 Transport Audit Handling 80 19.4.1 Auditing of wrapped commands 80 20. Audit Co
20、mmands 81 20.1 Audit Monotonic Counter 83 21. Design Section on Time Stamping 84 21.1 Tick Components 84 21.2 Basic Tick Stamp 85 21.3 Associating a TCV with UTC 85 21.4 Additional Comments and Questions 87 22. Context Management 89 23. Eviction 91 24. Session pool 92 25. Initialization Operations 9
21、3 26. HMAC digest rules 94 27. Generic authorization session termination rules 95 28. PCR Grand Unification Theory 96 28.1 Validate Key for use 98 29. Non Volatile Storage 100 29.1 NV storage design principles 101 29.1.1 NV Storage use models 101 29.2 Use of NV storage during manufacturing 103 30. D
22、elegation Model 104 30.1 Table Requirements 104 30.2 How this works 105 30.3 Family Table 106 30.4 Delegate Table 107 30.5 Delegation Administration Control 108 30.5.1 Control in Phase 1 109 30.5.2 Control in Phase 2 110 30.5.3 Control in Phase 3 110 30.6 Family Verification 110 30.7 Use of commands
23、 for different states of TPM 112 30.8 Delegation Authorization Values 112 30.8.1 Using the authorization value 112 30.9 DSAP description 113 31. Physical Presence 116 31.1 Use of Physical Presence 116 32. TPM Internal Asymmetric Encryption 117 BS ISO/IEC 11889-2:2009ISO/IEC 11889-2:2009(E) vi ISO/IE
24、C 2009 All rights reserved32.1.1 TPM_ES_RSAESOAEP_SHA1_MGF1 117 32.1.2 TPM_ES_RSAESPKCSV15 118 32.1.3 TPM_ES_SYM_CTR 118 32.1.4 TPM_ES_SYM_OFB 118 32.2 TPM Internal Digital Signatures 118 32.2.1 TPM_SS_RSASSAPKCS1v15_SHA1 119 32.2.2 TPM_SS_RSASSAPKCS1v15_DER 119 32.2.3 TPM_SS_RSASSAPKCS1v15_INFO 120
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- BSISOIEC1188922009INFORMATIONTECHNOLOGYTRUSTEDPLATFORMMODULEDESIGNPRINCIPLES 信息技术 信任 平台 模型 设计 原则 PDF

链接地址:http://www.mydoc123.com/p-396255.html