Course Hero Logo

When users play games online you want to ensure that

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 9 - 11 out of 13 pages.

When users play games online, you want to ensure that they areinteracting with a trusted PlayStation device. Assume that eachPlayStation device has an integratedTrusted Platform Module(TPM).iii.Explain why the TPM can be considered as a root of trust.Using thedirect anonymous attestation protocol, the online gameserver and update server can verify that the remote PlayStationdevice is a trusted one before it can be allowed to connect to thegame server for downloading games and the update server fordownloading updates respectively.iv.What are the typical values which the TPM on the PlayStationsends to the server for verification?(1 mark)(3 marks)(2 marks)(2 marks)
Page 10 of 13v.Which key is used to sign these values?vi.Where is this key stored on the TPM?vii.How many keys such keys would the TPM have of aPlayStation have?viii.Which key uniquely identifies the TPM? Where is it stored onthe TPM?ix.How does the use of a TPM on the physical servers provideboot integrity and protectionin the Sony cloud?TV shows and movies are stored encrypted on the Cloud servers.x.Assuming that a symmetric key is used to encrypt the TVshows and movies, describe how the symmetric key will besecured by the TPM.xi.Will such encrypted data bemigratable?(2 marks)(2 marks)(2 marks)(2 marks)(2 marks)(6 marks)(1 mark)QUESTION 3: (20 MARKS)(a)Consider theProgressive Elliptic Curve Encryption (PECE)forsecurely storing and sharing data on a cloud storage service such asDropbox.i.Discuss the benefits of using the PECE for securely storing andsharing data as compared to symmetric encryption.ii.Discuss the limitation(s) of PECE.iii.If an attacker captures data exchanged between a data ownerand a data recipient during the PECE data sharing, assumingthat the Cloud Service Provider does not collude with theattacker, will the attacker be able to compute the plaintext

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 13 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Spring
Professor
N/A
Tags
TPM

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture