2015
DOI: 10.1007/978-1-4302-6584-9
|View full text |Cite
|
Sign up to set email alerts
|

A Practical Guide to TPM 2.0

Abstract: Our passion in writing this book is to empower and excite a rising generation of IT managers, security architects, systems programmers, application developers, and average users to use the TPM as the bedrock of increasingly sophisticated security solutions that will stem the rising tide of threats that are being aimed at us, our employers, and our civil institutions. Furthermore, the TPM is just plain cool. How many engineers, as children, played with simple cryptography for fun? The ability to send an encrypt… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
2
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 98 publications
(15 citation statements)
references
References 0 publications
0
9
0
Order By: Relevance
“…As earlier works have shown [51], FPGAs can be used to implement all six elements required for a TPM [43]. These are as follows: Securely report boot environment, secure storage of data, Secure identification of the user and the system, support for standard security system, support for multiple users, and inexpensive production.…”
Section: Trusted Computing Overviewmentioning
confidence: 99%
“…As earlier works have shown [51], FPGAs can be used to implement all six elements required for a TPM [43]. These are as follows: Securely report boot environment, secure storage of data, Secure identification of the user and the system, support for standard security system, support for multiple users, and inexpensive production.…”
Section: Trusted Computing Overviewmentioning
confidence: 99%
“…In the secure boot process, computed PCR values are compared with reference values at different times points for verification. Hash functions are one-way functions used for integrity checking [25]. PCR registers commute the cumulative hash, with any bit flip in the configuration will result in an incorrect response.…”
Section: Trusted Platform Modulesmentioning
confidence: 99%
“…In the secure boot process, computed PCR values are compared with reference values at different times points for verification. Hash functions are one-way functions that are used for the integrity checking [24]. PCR registers commute the cumulative hash, with any bit flip in the configuration will result in a n incorrect response.…”
Section: Pcrn = Pcrn || Sha256(x) (1)mentioning
confidence: 99%