3. Abstract
Palladium is a software architecture designed
by Microsoft to implement parts of Trusted Computing Concepts
on future versions of Windows OS. This relies on Hardware
technology designed by members of Trusted Computing Group
which provide security features, cryptographic co-processors
and ability to hold keys securely.
4. Introduction about Cryptography
Security:
Many organizations posses valuable information they guard closely. As
more of this information is stored in computers the need of data
security becomes increasingly important. Protecting this information
against unauthorized usage is therefore a major concern for both
operating systems and users alike.
5. Cont..
Cryptography:
Cryptography is the method in which a message or file,
called plain text, is taken and encrypted into cipher text in such
a way that only authorized people know how to convert it back
to plane text.
7. Why weneed to go for Palladium Cryptography
In Quantam Cryptography tramission time for documents
encrypted using public key cryptography are significantly slower
then symmetric cryptography.In fact tramission of very large
document is prohibitive.
Public key Cryptography is susceptible to impersion attacks.
8. Propertiesof Palladium
Architectural enhancement to Windows kernel and computer
hardware.
Will not eliminate any features of Windows.
New applications must be written.
It will operate with any program user specifies while maintaining
security.
9. Concepts
Trusted Platform Module: provides secure storage of
cryptographic keys and a secure co-processor.
Curtained memory (trusted space)feature in CPU: Execution
space protected from external attacks (protected RAM) Data
within curtained memory can be accessed by applications to
which it belongs.
Sealed Storage: Authentication mechanism that allows
program to store secrets.
10. Secured Key
Cryptographic key is stored within TPM Applications provide
encrypted data to TPM to be decrypted and decrypted data is
provided for authentication
TPM stores a single key securely
Data as an extension stored in encrypted form that can be
decrypted only by key in TPM
TPM generates cryptographic signature based on hidden key.
11. Working of Palladium
This architecture will include a new security computing chip and
design changes to a computer’s central processing unit (CPU),
chipsets, and peripheral devices, such as keyboards and
printers.
The pc-specific secret coding within palladium makes stolen
files useless on other machines as they are physically and
cryptographically locked within the hardware of the machine.
12. Protection using Palladium
Palladium prevents identity theft and unauthorized access to
personal data on the user’s device while on the internet and on
other networks.
With palladium, a system’s secrets are locked in the computer
and are only revealed on terms that the user has specified.
13. Advantages
One of the more promising aspects that palladium will bring to
end-user is the ability to authenicate the programs they use.
The digital rights management (DRM) potential with a palladium
is what content producers and distributors are intersted with.
Digital rights management has to do with controlling whom and
how long content is distributed.
14. Shortcomingsand Pit fallsof Palladium
Software and applications have to be rewritten to synchronize
with palladium or new applications must be written
Changes are to be made to the existing computer hardware to
support palladium.
It would be a long time before this technology became
commonplace.
15. Conclusion
With the usage of “palladium” systems, trustworthy, secure
interactions will become possible. This technology will provide
tougher security defenses and more abundant privacy benefits
than ever before. With palladium, users will have unparalleled
power over system integrity, personal privacy and data security.