University of Surrey

Test tubes in the lab Research in the ATI Dance Research

Algorithm agility – discussion on TPM 2.0 ECC functionalities.

Chen, Liqun and Urian, R (2016) Algorithm agility – discussion on TPM 2.0 ECC functionalities. In: 3rd International conference on Security Standardization Research, 2016-12-05 - 2016-12-06, Gaithersburg, MD, USA.

[img]
Preview
Text
SSR.pdf - Accepted version Manuscript
Available under License : See the attached licence file.

Download (534kB) | Preview
[img]
Preview
Text (licence)
SRI_deposit_agreement.pdf
Available under License : See the attached licence file.

Download (33kB) | Preview

Abstract

The TPM 2.0 specification has been designed to support a number of Elliptic Curve Cryptographic (ECC) primitives, such as key exchange, digital signatures and Direct Anonymous Attestation (DAA). In order to meet the requirement that di↵erent TPM users may favor di↵erent cryptographic algorithms, each primitive can be implemented from multiple algorithms. This feature is called Algorithm Agility. For the purpose of performance efficiency, multiple algorithms share a small set of TPM commands. In this paper, we review all the TPM 2.0 ECC functionalities, and discuss on whether the existing TPM commands can be used to implement new cryptographic algorithms which have not yet been addressed in the specification. We demonstrate that four asymmetric encryption schemes specified in ISO/IEC 18033-2 can be implemented using a TPM 2.0 chip, and we also show on some ECDSA variants that the coverage of algorithm agility from TPM 2.0 is limited. Security analysis of algorithm agility is a challenge, which is not responded in this paper. However, we believe that this paper will help future researchers analyze TPM 2.0 in more comprehensive methods than it has been done so far.

Item Type: Conference or Workshop Item (Conference Paper)
Subjects : Computer Science
Divisions : Faculty of Engineering and Physical Sciences > Computing Science
Authors :
NameEmailORCID
Chen, Liqunliqun.chen@surrey.ac.ukUNSPECIFIED
Urian, RUNSPECIFIEDUNSPECIFIED
Date : 2 November 2016
Identification Number : 10.1007/978-3-319-49100-4
Copyright Disclaimer : The final publication is available at http://www.springer.com/gb/book/9783319490991
Contributors :
ContributionNameEmailORCID
UNSPECIFIEDSpringer International Publishing, UNSPECIFIEDUNSPECIFIED
Uncontrolled Keywords : algorithm agility, elliptic curve cryptography, trusted platform module
Related URLs :
Depositing User : Symplectic Elements
Date Deposited : 04 Apr 2017 13:26
Last Modified : 07 Jul 2017 08:26
URI: http://epubs.surrey.ac.uk/id/eprint/813932

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year


Information about this web site

© The University of Surrey, Guildford, Surrey, GU2 7XH, United Kingdom.
+44 (0)1483 300800