Total Maintenance Productive
Trusted Platform Module offers facilities for the secure generation of cryptographic keys, and limitation of their use, in addition to a hardware pseudo-random number generator. It alsoincludes capabilities such as remote attestation and sealed storage. "Remote attestation" creates a nearly unforgeable hash key summary of the hardware and software configuration. The extent of the summaryof the software is decided by the program encrypting the data. This allows a third party to verify that the software has not been changed. "Binding" encrypts data using the TPM endorsement key, aunique RSA key burned into the chip during its production, or another trusted key descended from it.[3] "Sealing" encrypts data similar to binding, but in addition specifies a state in which the TPM mustbe in order for the data to be decrypted (unsealed).[4]
A Trusted Platform Module can be used to authenticate hardware devices. Since each TPM chip has a unique and secret RSA key burned in as it isproduced, it is capable of performing platform authentication. For example, it can be used to verify that a system seeking access is the expected system.
Generally, pushing the security down to thehardware level in conjunction with software provides more protection than a software-only solution. However even where a TPM is used, a key is still vulnerable while a software application that has...
Regístrate para leer el documento completo.