Computer Security lecture notes Copyright © 2004 Mark Dermot Ryan
The University of Birmingham
Permission is granted to copy, distribute and/or modify this document
under the terms of the GNU Free Documentation License,

Trusted Computing and NGSCB

In order to provide better security and to prevent software and media piracy, a "locked-down" PC architecture is being developed which has hardware-level cryptographic keys for encryption and authentication. It is tamper-resistant, has curtained memory, and communication with the keyboard, mouse, monitor and printer may be encrypted.

The problem being addressed

Current open platforms (PCs, PDAs, etc.) allow a great deal of flexibility to the user, but this has resulted in

Trusted Computing (TC)

The Trusted Computing Group (TCG) is an alliance of Microsoft, Intel, IBM, HP and AMD which promotes a standard for a "more secure" PC. Microsoft is one of the main drivers; its version of TC is called New Generation Secure Computing Base (NGSCB); formerly known as Palladium. TC provides a computing platform on which you can't tamper with the application software, and where these applications can communicate securely with servers. The original motivation was digital rights management (DRM): music files will be encrypted, and can only be run by recognised application software on a TC platform. The software will prevent you from making copies, and can restrict you in arbitrary other ways, e.g. by playing only a certain number of times, or for a limited period.

Early announcements of TC included much more draconian measures, such as software which would delete ordinary applications and media files if it detected (e.g. by steganographic watermarking) copyright violations which took place outside the scope of TC.

Current motivations and applications for TC extend way beyond DRM. Bill Gates: `We came at this thinking about music, but then we realized that e-mail and documents were far more interesting domains'. Email which cannot be printed or forwarded, and self-destructs after a specified period opens up many possibilities. Similarly, document authors could enforce privacy by restrictng the ways copies are made or extracts taken by cut-and-paste.

As a simple example to illustrate how this would work: You can send an e-mail and set a condition that it may not be forwarded on. The e-mail itself is encrypted and contains the information about the rights you have associated with it. The recipient of the e-mail will only be able to view it when their TC chip agrees that they have the right to do so, and their TC software will display the e-mail in such a way that they will be unable to copy and paste the text into a new e-mail in order to forward it. The same principles will apply to all types of files, notably music and video files. You could create  documents that can only be read in, say, the next week, after which point they become unusable.

How TC works

The hardware is manufactured with a public/private key pair. Ideally, the manufacturing process destroys all records of the private key. The chip is tamper-proof (it self-destructs rather than gives up its private key). Servers need to know the set of valid public keys (or the set of known invalid ones). Memory is curtained, to prevent debuggers and other software getting the private key.

The attestation protocol (adapted from [2])

Questions to think about/discuss.

  1. What is the role of #A
  2. Could we invent a protocol which doesn't require the hardware to have a public/private key pair?
  3. Why have the key pair for A? Can't we just use the hardware keys?

Why TC is a bad thing

TC has been much criticised by respected commentators, and with good reason.
"Trusted Computing" means your PC is more trustworthy from the point of view of software vendors and content providers, but less trustworthy from the point of view of their owners.

Will TC take off, or will it die?

Reasons for thinking it will take off:
Reasons for thinking it won't.

How does TC differ from CSS?

DVDs have a protection scheme known as Content Scrambling System. Although it appears complex and includes hardware authentication and session key establishment (see, e.g., Greg Kesden's Tutorial on CSS), it is essentially a Break-Once-Run-Everywhere technology (BORE). It was indeed broken, by a 16-year old Norwegian programmer who wrote DeCSS. TC avoids BORE by having different keys in every PC. Even if you succeed in breaking yours, that won't help anyone else.

What else is like TC?

Digital rights management

Can we achieve DRM?
Consider this scenario: you download encrypted file, for which the key is held on a smart card. Invent a system which only allows the user to play the file if the smart card is present in the computer.
  1. Smart card does the decryption.
    Problem: smart card very slow (3MHz), and, to make matters worse, this may be public key cryptography which is more computationally expensive
  2. Device has trusted software which the user cannot interfere with or change (e.g., dedicated music player)
  3. Can we do it on a standard PC?


Resources

  1. Microsoft's papers including some technical information.
  2. Tal Garfinkel, Mendel Rosenblum, and Dan Boneh. Flexible OS Support and Applications for Trusted Computing gives some detail on a possible protocol (described in these notes).
  3. Ross Anderson's Trusted Computing FAQ is an excellent source of information, and has lots of links/references.
  4. Richard Stallman, Can you trust your computer?
  5. A weblog by Seth Schoen which contains some technical details of NGSCB presented very informally.

A longer version of these notes

HP declares war on sharing culture --- The company whose slogan is "Invent" is doing all it can to stifle innovation, new business models and new markets.
P. Biddle, P. England, M. Peinado, B. Willman, Microsoft Corp., The Darknet and the Future of Content Distribution.

Security standards could make anti-piracy easier A software-hardware system designed to make personal computers more secure could also improve copy prevention systems 18:35  16  September 2003 New Scientist
Security standards could bolster file-sharing networks Features designed to make unauthorised digital copying more difficult could also strengthen controversial peer-to-peer networks, say US researchers 17:47  03  June 2003   New Scientist
Intel plans secure microprocessors The "virtual vault" will not only protect data against hackers but also provide anti-piracy features 16:53  11  September 2002  New Scientist

End