Difference between revisions of "TPM"

From MgmtWiki
Jump to: navigation, search
(Solution)
(Solution)
 
Line 7: Line 7:
 
*Version 1 of the TPM was always instantiated in a hardware chip and there was a great deal of promotion of the concept of hardware protected security. This solution was complex for the user to control.
 
*Version 1 of the TPM was always instantiated in a hardware chip and there was a great deal of promotion of the concept of hardware protected security. This solution was complex for the user to control.
 
*Version 2 of the TPM may be implemented in software which was loaded into a [[Trusted Execution Environment]] which introduces complexity of implementation.
 
*Version 2 of the TPM may be implemented in software which was loaded into a [[Trusted Execution Environment]] which introduces complexity of implementation.
** The software for an [https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/raj fTPM: A Software-Only Implementation of a TPM Chip] was crate by David Wooten and Paul England at Microsoft.
+
** The software for an [https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/raj fTPM: A Software-Only Implementation of a TPM Chip] was crate by David Wooten and Paul England at Microsoft. (2016-08-10-12)
  
 
==References==
 
==References==

Latest revision as of 21:41, 13 April 2021

Full Title

Trusted Platform Module is a specific case of a Trusted Execution Environment.

Problem

Attestation of the security of a remote (User) device.

Solution

  • Version 1 of the TPM was always instantiated in a hardware chip and there was a great deal of promotion of the concept of hardware protected security. This solution was complex for the user to control.
  • Version 2 of the TPM may be implemented in software which was loaded into a Trusted Execution Environment which introduces complexity of implementation.

References