Published in

Journal of the Korea Academia-Industrial cooperation Society, 4(12), p. 1876-1883

DOI: 10.5762/kais.2011.12.4.1876

Links

Tools

Export citation

Search in Google Scholar

An Off-line Dictionary Attack on Command Authorization in TPM and its Countermeasure

Journal article published in 2011 by Doo-Hwan Oh, Doo-Sik Choi, Ki-Hyun Kim, Jae-Cheol Ha
This paper is made freely available by the publisher.
This paper is made freely available by the publisher.

Full text: Download

Question mark in circle
Preprint: policy unknown
Question mark in circle
Postprint: policy unknown
Question mark in circle
Published version: policy unknown

Abstract

The TPM is a hardware chip for making a trusted environment on computing system. We previously need a command authorization process to use principal TPM commands. The command authorization is used to verify an user who knows a usage secret to TPM chip. Since the user uses a simple password to compute usage secret, an attacker can retrieve the password by evasdropping messages between user and TPM chip and applying off-line dictionary attack. In this paper, we simulate the off-line dictionary attack in real PC environment adopted a TPM chip and propose a novel countermeasure to defeat this attack. Our proposed method is very efficient due to its simplicity and adaptability without any modification of TPM command structures.