On Sun, 14 Dec 2003, Jerrold Leichter wrote: > Which brings up the interesting question: Just why are the reactions to > TCPA so strong? Is it because MS - who no one wants to trust - is > involved? Is it just the pervasiveness: Not everyone has a smart card, > but if TCPA wins out, everyone will have this lump inside of their > machine.
There are two differences between TCPA-hardware and a smart card. The first difference is obvious. You can plug in and later remove a smart card at your will, at the point of your choice. Thus, for homebanking with bank X, you may use a smart card, for homebaning with bank Y you disconnect the smart card for X and use another one, and before online gambling you make sure that none of your banking smart cards is connected to your PC. With TCPA, you have much less control over the kind of stuff you are using. This is quite an advantage of smart cards. The second point is perhaps less obvious, but may be more important. Usually, *your* PC hard- and software is supposed to to protect *your* assets and satisfy *your* security requirements. The "trusted" hardware add-on in TCPA is supposed to protect an *outsider's* assets and satisfy the *outsider's* security needs -- from you. A TCPA-"enhanced" PC is thus the servant of two masters -- your servant and the outsider's. Since your hardware connects to the outsider directly, you can never be sure whether it works *against* you by giving the outsider more information about you than it should (from your point if view). There is nothing wrong with the idea of a trusted kernel, but "trusted" means that some entity is supposed to "trust" the kernel (what else?). If two entities, who do not completely trust each other, are supposed to both "trust" such a kernel, something very very fishy is going on. Can we do better? More than ten years ago, Chaum and Pedersen presented a great idea how to do such things without potentially compromising your security. Bringing their ideas into the context of TCPA, things should look like in the following picture +---------------+ +---------+ +---------------+ | Outside World | <-----> | Your PC | <-----> | TCPA-Observer | +---------------+ +---------+ +---------------+ So you can trust "your PC" (possibly with a trusted kernel ... trusted by you). And an outsider can trust the observer. The point is, the outside world does not directly talk to the observer! Chaum and Pedersen (and some more recent authors) defined protocols to satisfy the outsider's security needs without giving the outsider any chance to learn more about you and the data stored in your PC than you want her to learn. TCPA mixes "Your PC" and the "observer" into one "trusted kernel" and is thus open to abuse. Reference: D. Chaum and T. Pedersen. Wallet databases with observers. In Crypto '92, LNCS 740, pp. 89-105. -- Stefan Lucks Th. Informatik, Univ. Mannheim, 68131 Mannheim, Germany e-mail: [EMAIL PROTECTED] home: http://th.informatik.uni-mannheim.de/people/lucks/ ------ I love the smell of Cryptanalysis in the morning! ------ --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]