Difference between TCPA-Hardware and other forms of trust

Peter Gutmann pgut001 at cs.auckland.ac.nz
Thu Dec 18 21:48:34 EST 2003


John Gilmore <gnu at toad.com> writes:

>They eventually censored out all the sample application scenarios like DRM'd
>online music, and ramped up the level of jargon significantly, so that nobody
>reading it can tell what it's for any more.  Now all the documents available
>at that site go on for pages and pages saying things like "FIA_UAU.1 Timing of
>authentication. Hierarchical to: No other components. FIA_UAU.1.1 The TSF
>shall allow access to data and keys where entity owner has given the 'world'
>access based on the value of TCPA_AUTH_DATA_USAGE; access to the following
>commands: TPM_SelfTestFull, TPM_ContinueSelfTest, TPM_GetTestResult,
>TPM_PcrRead, TPM_DirRead, and TPM_EvictKey on behalf of the user to be
>performed before the user is authenticated."

That gobbledigook sounds like Common Criteria-speak.  So it's not deliberate,
it's a side-effect of making it CC-friendly.

>nobody reading it can tell what it's for any more

Yup, that's definitely Common Criteria.

Peter.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com



More information about the cryptography mailing list