Currently , interests mainly focus on the implementation of the tpm and it ’ s application . few discusses are about the security of the tpm 然而当前人们主要关心可信平台模块的实现以及其上的应用开发,却很少讨论可信平台模块本身的安全性。
The trusted platform needs the tpm ’ s trusted measure ability , trusted storage ability and trusted report ability to attest to user the truth of the platform 可信平台需要可信平台模块的可信测量能力,可信存储能力和可信的报告能力,向用户证实平台是可信的。
The third question is how to use tpm in new application . after analyzing security of tpm , we implemented tpm and use the implemented tpm to verity the security analysis of tpm 在分析完可信平台模块的安全性后,具体实现了可信平台模块,并用实现的可信平台模块验证了对可信平台模块的安全性分析。
Then logic reasoning is made on the formal description . through reasoning and analysis , some secure vulnerabilities are found in the cryptographic protocols of tpm , and repair methods are also proposed 在推理分析中,也发现了可信平台模块密码学协议的一些安全漏洞,并在分析的基础上修复了这些安全漏洞。
In this case , we do research on the security analysis of tpm . the security of tpm is for the purpose of solving the following questions . the first question is whether tpm is secure 在这种情况下,本论文对可信平台模块的安全性进行分析,以得出可信平台模块是否安全,能否改进可信平台模块的安全性,和怎样更好的使用可信平台模块。
Finally , two new security applications are developed based on tpm . tpm provides services by its apis ( application programming interface ) , but the security of these apis is not mentioned in tcg ’ s specification and not guaranteed by tcg 可信平台模块的各种能力是以api ( applicationprogramminginterface )方式提供的,但这些可信平台模块api是否安全,在可信平台模块规范中没有涉及,也没有保证。