Title
Security properties analysis in a TPM-based protocol
Abstract
Security protocols are designed in order to provide security properties goals. They achieve their goals using cryptographic primitives such as key agreement or hash functions. Security analysis tools are used in order to verify whether a security protocol achieves its goals or not. The analysed property by specific purpose tools are predefined properties such as secrecy confidentiality, authentication or non-repudiation. There are security goals that are defined by the user in systems with security requirements. Analysis of these properties is possible with general purpose analysis tools such as coloured petri nets CPN. This research analyses two security properties that are defined in a protocol that is based on trusted platform module TPM. The analysed protocol is proposed by Delaune to use TPM capabilities and secrets in order to open only one secret from two submitted secrets to a recipient.
Year
DOI
Venue
2014
10.1504/IJSN.2014.060742
International Journal of Security and Networks
Keywords
Field
DocType
cryptography,security analysis,trusted platform module
Cryptographic protocol,Computer security,Computer science,Covert channel,Computer network,Trusted Platform Module,Cryptographic primitive,Security association,Security service,Security analysis,Computer security model
Journal
Volume
Issue
Citations 
9
2
0
PageRank 
References 
Authors
0.34
25
4
Name
Order
Citations
PageRank
Y. Seifi100.34
Suriadi Suriadi221018.89
Ernest Foo327628.76
C. Boyd400.34