Security Analysis and Improvement of the TPM's Two Main Authorization Protocols

Wan LIU,Ming TAN,Xing-Shu CHEN
DOI: https://doi.org/10.3969/j.issn.1002-137X.2008.03.085
2008-01-01
Computer Science
Abstract:The main function of trusted computing is done by the trusted platform module.For the working of TPM is based on the OIAP and OSAP protocol,it is most important to ensure the secure working of the two protocols.This article does logic description and security analysis on the two protocols,then presents some ways to protect the two protocols from being attacked.
What problem does this paper attempt to address?