English
Language : 

L12-TCPA-PALLADIUM Datasheet, PDF (9/12 Pages) List of Unclassifed Manufacturers – TCPA and Palladium
9
• Strong process isolation
• Root key for persistent secret protection
• Secure path to and from user
• Attestation
The first three are needed to protect against malicious code (viruses, Trojans, etc.). Attestation
breaks new ground. With attestation, facts about “things” (software, users, machines, services) can
be proved to (and believed by) remote entities.
Code Identity
OS Identity:
• Keep hardware simple
• The SSC/chipset measures the digest of the nexus on “secure initiation”
Application Identity:
• Could use a digest, but we actually use a “manifest” which simplifies management (A “mani-
fest” is a signed statement of hashes)
Sealed Storage
Sealed storage allows software to keep long-lived secrets safe from other software running on the
host.
• Sealed storage uses an encryption technology, but it’s more than simple encryption
– The security chip has very little storage (just room for keys)
– Let’s say I have a banking application that I want to protect. How can it encrypt its stuff
and then hide its key?
• An OS/nexus can keep secrets from other OS’s
– We involve the secret key in the chip (that no one ever gets to see since it’s baked in
at build) in the encryption. Forgetting the banking application for now, let’s say I’m a
Nexus and I want to encrypt something, so I ask the SSC. It uses its AES key and it
brands it with my hash value (the hash of myself, the nexus) and now it will only give
the data back to me since I’m the only one that hashes to the proper value. The SSC
holds the key and so it only gives content to the code which sealed it.
• If an OS can keep a secret, it can provide a similar service to applications