From: Thomas W. <tc...@to...> - 2010-11-18 07:22:50
|
Hi, Out of curiosity I had a brief look at the paper. It looks like the authors actually claim to use an AIK for encryption of arbitrary data. This clearly should not be possible with a TPM that conforms to the spec. Maybe they use a binding key that was certified with an AIK and just forgot to mention that in the paper.... Honestly, I could point you to a number of papers (published at scientific conferences) that claim to do all sorts of interesting things with TPMs which should not be possible (such as using the EK for data encryption and signing). So be careful with what papers claim (even if they are published at peer- reviewed conferences or workshops). Bye, Thomas On Wednesday 17 November 2010 16:35:09 Ronald Tögl wrote: > Hello, > > I don't know how the authors of this workshop papers implemented this. > Please consult the TPM spec on the detailed capabilities of and > operations using identity keys. > > Regards, > Ronald > > On 11/17/2010 04:24 PM, FADY FADY wrote: > > Hello > > > > Thanks A Lot for your support, > > > > Ok, This means AIK is only capable of quote and certify, is this true? > > But really, I found a paper on IEEE Computer Magazine > > http://ieeexplore.ieee.org/Xplore/login.jsp?url=http%3A%2F%2Fieeexplore.i > > eee.org%2Fiel5%2F5319074%2F5319075%2F05319186.pdf%3Farnumber%3D5319186&au > > thDecision=-203 > > <http://ieeexplore.ieee.org/Xplore/login.jsp?url=http%3A%2F%2Fieeexplore > > .ieee.org%2Fiel5%2F5319074%2F5319075%2F05319186.pdf%3Farnumber%3D5319186& > > authDecision=-203> that speaks about encryption by AIK Public one a > > remote machine and decryption by AIK private in the key owner machine, > > this specified in section 3.2 of the paper. > > The paper is attached in the email. > > > > So is this really can be happened and how? > > Thanks > > > > ------------------------------------------------------------------------ > > *From:* Ronald Tögl <ron...@ia...> > > *To:* FADY FADY <fad...@ya...> > > *Cc:* tru...@li... > > *Sent:* Mon, November 8, 2010 10:50:36 AM > > *Subject:* Re: How to Sign by the private part of AIK > > > > Hello, > > > > I was referring to the TPM_CertifyKey resp. TPM_CertifyKey2 > > mechanisms, not quote. > > > > Ronald > > > > On 11/07/2010 02:10 PM, FADY FADY wrote: > >> Hello, > >> > >> Thank You for your response about my last question. > >> > >> But does that mean the only way to sign myEnkKey by AIK > >> is to send > >> > >> quote(aik,pcr,nonce) + myEncKey > >> > >> To the other party > >> > >> Or in general, to sign any data by AIK then encrypt we send > >> > >> {quote(aik,pcr,nonce) + theDataToBeSigned} all of these encrypted > >> > >> by the other entity encryption key > >> > >> Or there is another Way to sign the myEnkKey by AIK? > >> > >> Thanks, I Really appreciate your help, > >> Fady -- Thomas Winkler mail: tc...@to... |