If the authentication mechanism is implemented in software only, the access is prone to dictionary attacks. The attacker who has physical or administrative access to a computer can circumvent TPM, e. TrustZone Based Trusted Kernel”. Retrieved from ” https: A complete specification consists of a platform-specific specification which references a common four-part TPM 2.
|Date Added:||6 November 2018|
|File Size:||15.85 Mb|
|Operating Systems:||Windows NT/2000/XP/2003/2003/7/8/10 MacOS 10/X|
|Price:||Free* [*Free Regsitration Required]|
To continue using , please upgrade your browser.
In the future, this concept could be co-located on an existing motherboard chip in computers, or any other device where the TPM facilities tp be employed, such as a cellphone. TCG has faced resistance to the deployment of this technology in some areas, where some authors see possible uses not specifically related to Trusted Computingwhich may raise privacy concerns.
Operating systems often require authentication involving a password or other means to protect keys, data or systems. The one-size-fits-all specification consists of three parts.
These metrics can be used to detect changes to previous configurations and decide how to proceed. This private key must be known to the hardware chip manufacturer at manufacture time, otherwise they would not be able to burn the key into the circuit. However, on devices where a hardware source of entropy is available, a PRNG need not be implemented.
The responsibility of assuring said integrity using TPM is with the firmware and the operating system. There is no need to distinguish between the two at the TCG specification afmel. Currently TPM is used by nearly all PC and atme, manufacturers, primarily offered on professional product lines.
Other uses exist, some of which give rise to privacy concerns. It could remotely attest that a computer is using the specified hardware and software. The “physical presence” feature of TPM addresses some of these concerns by requiring BIOS-level confirmation for operations such as activating, deactivating, clearing or changing ownership of TPM by someone who is physically present at the console of the machine.
Without this level of protection, only passwords with high complexity would provide sufficient protection. Retrieved October 27, In other projects Wikimedia Commons.
Trusted Platform Module
A random number generatora public-key cryptographic algorithma cryptographic hash functiona mask generation function, digital signature generation and verification, and Direct Anonymous Attestation are required. Pushing the security down to the hardware level atmle more protection than a software-only solution.
Microsoft — via Microsoft TechNet. Starting inmany new laptops have been sold with a built-in TPM chip. TCPA technology in context. International Organization for Standardization.
Researcher claims hack of processor used to secure Xboxother products”. US Department of Defense.
Thus, the security of the TPM relies entirely on the manufacturer and the authorities in the country where the hardware is produced. Archived from the original on 3 August Since TPM is implemented in a dedicated hardware module, a dictionary attack prevention mechanism was built in, which effectively protects against guessing or automated dictionary attacks, while still allowing the user a sufficient and reasonable number of tries.
It consisted of three parts, based on their purpose. Tpk primary scope of TPM is to assure the integrity of a platform.