What is Trusted Computing?

If you take one thing away from this slide, memorize this: Trusted Computing allows a piece of data to dictate what Operating System and Application must be used to open it.

According to Wikipedia:

Trusted computing involves five features:

This, like many other descriptions of Trusted Computing, hides the underlying principle. Study our diagram below instead.

Trusted computing in one picture:





Trusted computing in one sentence:

Trusted Computing allows a piece of data to dictate what Operating System and Application must be used to open it. Ponder on this.

In current situations, given a piece of data, you can choose what OS and what application you use to open it (though some do not make practical sense). Under Trusted Computing, the data dictates what Operating System and Application must be used to access it.

TPM Unit:

  • TPM stands for Trusted Platform Module
  • Inexpensive ~ $8.00 chip.
  • Contains the Endorsement Key: unique, 2048bit RSA key
  • Encrypts/decrypts (including signing) messages.
  • Supposed to be tamper proof.


What Trusted Computing Provides

Sealed Storage

Pieces of data can be 'sealed', ensuring that only certain pieces of software (chosen by a third party, not you) can unseal and interact with the data. These software, designed by the third party, can be designed to limit/control the way the user interacts with the data.

From a technical standpoint, this is done through encryption and verifying the software/operating system stack before decrypting.

We can think of Sealed Storage as Remote Attestation without an outside server.

Remote Attestation

Remote Attestation allows a third party to verify the software / operating system stack running on your computer. They can then, based on this information, decide whether to send you data or not. With Trusted Computing, the focus of trust -- is on external parties, generally large corporations. The goal is that some external third party can trust the software running on your computer when your computer interacts with their server.

Other Things

Trusted Computing can also be used to completely break anonymity (cite) and make computers more secure (cite), but are not our focus at the moment (and to the best of our knowledge were not reason Trusted Computing was pushed).
Contents:

Extras: