Cargando…

Trusted platform module basics : using TPM in embedded systems /

Intended for embedded designers, this book provides a foundation on the TPM, helping designers take advantage of hardware security based on sound TCG standards. It covers the TPM basics, discussing the TPM Key Hierarchy and the Trusted Platform Module specification. It also includes an accompanying...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Kinney, Steven
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Oxford : Newnes, 2006.
Colección:Embedded technology series.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • TCG prerequisites
  • Cryptographic basics
  • Overview of the TPM architecture
  • Root-of-trust, the TPM endorsement key
  • Key hierarchy and key management
  • Platform configuration registers
  • TPM command message overview
  • Rolling nonces and anti-replay protection
  • Command authorization, typical
  • Command authorization, atypical
  • The initialization and low-level command suite
  • Compliance vectors and their purpose
  • Establishing a TPM owner
  • Owner-authorized command suite
  • The key management command suite
  • The RSA encryption and decryption command suite
  • The TPM signature command
  • The RNG command suite
  • The PCR command suite
  • The TPM capability and self-test command suite
  • The key migration and secret management suite
  • The trusted device driver
  • TPM system deployment initialization
  • Migrating to version 1.2 of the TPM
  • Example one : TPM ownership
  • More command examples.