• Shopping Cart
    There are no items in your cart

BS ISO/IEC 11889-2:2009

Current

Current

The latest, up-to-date edition.

Information technology. Trusted platform module Design principles

Available format(s)

Hardcopy , PDF

Language(s)

English

Published date

31-08-2009

€416.02
Excluding VAT

1 Scope
   1.1 Key words
   1.2 Statement Type
2 Normative references
3 Abbreviated Terms
4 Conformance
   4.1 Introduction
   4.2 Threat
   4.3 Protection of functions
   4.4 Protection of information
   4.5 Side effects
   4.6 Exceptions and clarifications
5 TPM Architecture
   5.1 Interoperability
   5.2 Components
        5.2.1 Input and Output
        5.2.2 Cryptographic Co-Processor
        5.2.3 Key Generation
        5.2.4 HMAC Engine
        5.2.5 Random Number Generator
        5.2.6 SHA-1 Engine
        5.2.7 Power Detection
        5.2.8 Opt-In
        5.2.9 Execution Engine
        5.2.10 Non-Volatile Memory
   5.3 Data Integrity Register (DIR)
   5.4 Platform Configuration Register (PCR)
6 Endorsement Key Creation
   6.1 Controlling Access to PRIVEK
   6.2 Controlling Access to PUBEK
7 Attestation Identity Keys
8 TPM Ownership
   8.1 Platform Ownership and Root of Trust for Storage
9 Authentication and Authorization Data
   9.1 Dictionary Attack Considerations
10 TPM Operation
   10.1 TPM Initialization & Operation State Flow
        10.1.1 Initialization
   10.2 Self-Test Modes
        10.2.1 Operational Self-Test
   10.3 Startup
   10.4 Operational Mode
        10.4.1 Enabling a TPM
        10.4.2 Activating a TPM
        10.4.3 Taking TPM Ownership
        10.4.4 Transitioning Between Operational States
   10.5 Clearing the TPM
11 Physical Presence
12 Root of Trust for Reporting (RTR)
   12.1 Platform Identity
   12.2 RTR to Platform Binding
   12.3 Platform Identity and Privacy Considerations
   12.4 Attestation Identity Keys
        12.4.1 AIK Creation
        12.4.2 AIK Storage
13 Root of Trust for Storage (RTS)
   13.1 Loading and Unloading Blobs
14 Transport Sessions and Authorization Protocols
   14.1 Authorization Session Setup
   14.2 Parameter Declarations for OIAP and OSAP Examples
        14.2.1 Object-Independent Authorization Protocol (OIAP)
        14.2.2 Object-Specific Authorization Protocol (OSAP)
   14.3 Authorization Session Handles
   14.4 Authorization-Data Insertion Protocol (ADIP)
   14.5 AuthData Change Protocol (ADCP)
   14.6 Asymmetric Authorization Change Protocol (AACP)
15 ISO/IEC 19790 Evaluations
   15.1 TPM Profile for successful ISO/IEC 19790 evaluation
16 Maintenance
   16.1 Field Upgrade
17 Proof of Locality
18 Monotonic Counter
19 Transport Protection
   19.1 Transport encryption and authorization
        19.1.1 MGF1 parameters
        19.1.2 HMAC calculation
        19.1.3 Transport log creation
        19.1.4 Additional Encryption Mechanisms
   19.2 Transport Error Handling
   19.3 Exclusive Transport Sessions
   19.4 Transport Audit Handling
        19.4.1 Auditing of wrapped commands
20 Audit Commands
   20.1 Audit Monotonic Counter
21 Design Section on Time Stamping
   21.1 Tick Components
   21.2 Basic Tick Stamp
   21.3 Associating a TCV with UTC
   21.4 Additional Comments and Questions
22 Context Management
23 Eviction
24 Session pool
25 Initialization Operations
26 HMAC digest rules
27 Generic authorization session termination rules
28 PCR Grand Unification Theory
   28.1 Validate Key for use
29 Non Volatile Storage
   29.1 NV storage design principles
        29.1.1 NV Storage use models
   29.2 Use of NV storage during manufacturing
30 Delegation Model
   30.1 Table Requirements
   30.2 How this works
   30.3 Family Table
   30.4 Delegate Table
   30.5 Delegation Administration Control
        30.5.1 Control in Phase 1
        30.5.2 Control in Phase 2
        30.5.3 Control in Phase 3
   30.6 Family Verification
   30.7 Use of commands for different states of TPM
   30.8 Delegation Authorization Values
        30.8.1 Using the authorization value
   30.9 DSAP description
31 Physical Presence
   31.1 Use of Physical Presence
32 TPM Internal Asymmetric Encryption
        32.1.1 TPM_ES_RSAESOAEP_SHA1_MGF1
        32.1.2 TPM_ES_RSAESPKCSV15
        32.1.3 TPM_ES_SYM_CTR
        32.1.4 TPM_ES_SYM_OFB
   32.2 TPM Internal Digital Signatures
        32.2.1 TPM_SS_RSASSAPKCS1v15_SHA1
        32.2.2 TPM_SS_RSASSAPKCS1v15_DER
        32.2.3 TPM_SS_RSASSAPKCS1v15_INFO
        32.2.4 Use of Signature Schemes
33 Key Usage Table
34 Direct Anonymous Attestation
   34.1 TPM_DAA_JOIN
   34.2 TPM_DAA_Sign
   34.3 DAA Command summary
        34.3.1 TPM setup
        34.3.2 JOIN
        34.3.3 SIGN
35 General Purpose IO
36 Redirection
37 Structure Versioning
38 Certified Migration Key Type
   38.1 Certified Migration Requirements
   38.2 Key Creation
   38.3 Migrate CMK to a MA
   38.4 Migrate CMK to a MSA
39 Revoke Trust
40 Mandatory and Optional Functional Blocks
41 1.1a and 1.2 Differences
42 Bibliography

Describes the Trusted Platform Module (TPM), a device that enables trust in computing platforms in general.

Committee
IST/33
DevelopmentNote
2009 Edition with its corrigendum remains active. Supersedes 14/30302801 DC. (04/2016)
DocumentType
Standard
Pages
156
PublisherName
British Standards Institution
Status
Current
SupersededBy
Supersedes

Standards Relationship
ISO/IEC 11889-2:2015 Identical
ISO/IEC 11889-2:2009 Identical

ISO/IEC 11889-1:2015 Information technology — Trusted platform module library — Part 1: Architecture
ISO/IEC 15946-1:2016 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 1: General
ISO/IEC 14888-3:2016 Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms
ISO/IEC 11889-3:2015 Information technology — Trusted Platform Module Library — Part 3: Commands
ISO/IEC 18033-3:2010 Information technology Security techniques Encryption algorithms Part 3: Block ciphers
ISO/IEC 10118-3:2004 Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions
ISO/IEC 9797-2:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function
ISO/IEC 10116:2017 Information technology — Security techniques — Modes of operation for an n-bit block cipher
ISO/IEC 11889-4:2015 Information technology — Trusted Platform Module Library — Part 4: Supporting Routines

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.