Skip to main content

Universal Trusted Computing Bases

  • Chapter
  • First Online:
Symmetric Cryptographic Protocols
  • 560 Accesses

Abstract

For any system with a desired set of assurances, the trusted computing base (TCB) includes every component that needs to be trusted to realize the desired assurances. In other words, the assumptions regarding the integrity of the TCB components, and more importantly, only the assumption of integrity of the TCB is required to realize all desired assurances for the system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Notable exceptions to this rule are the infamous WEP [104] protocol, and the Xbox hack [105] that exploits a weakness in the Tiny Encryption Algorithm (TEA) cipher [106].

  2. 2.

    Typically the manufacturer of the TPM chip.

  3. 3.

    For example, a file hash, or signature, or current balance, or a DNS record, etc.

  4. 4.

    Intangible assumptions regarding the integrity of such “other” components can turn out to be incorrect.

  5. 5.

    In practice the delegation may occur in a hierarchical manner, through multiple levels of registrars and ISPs.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mahalingam Ramkumar .

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Ramkumar, M. (2014). Universal Trusted Computing Bases. In: Symmetric Cryptographic Protocols. Springer, Cham. https://doi.org/10.1007/978-3-319-07584-6_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-07584-6_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-07583-9

  • Online ISBN: 978-3-319-07584-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics