Trusted platform module basics : using TPM in embedded systems /

Main Author: Kinney, Steven.
Format: Book
Language:English
Published: Oxford : Newnes, 2006.
Series:Embedded technology series
Subjects:
Online Access:http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=173590
Table of Contents:
  • TCG prerequisites
  • Cryptographic basics
  • Overview of the TPM architecture
  • Root-of-trust, the TPM endorsement key
  • Key hierarchy and key management
  • Platform configuration registers
  • TPM command message overview
  • Rolling nonces and anti-replay protection
  • Command authorization, typical
  • Command authorization, atypical
  • The initialization and low-level command suite
  • Compliance vectors and their purpose
  • Establishing a TPM owner
  • Owner-authorized command suite
  • The key management command suite
  • The RSA encryption and decryption command suite
  • The TPM signature command
  • The RNG command suite
  • The PCR command suite
  • The TPM capability and self-test command suite
  • The key migration and secret management suite
  • The trusted device driver
  • TPM system deployment initialization
  • Migrating to version 1.2 of the TPM
  • Example one : TPM ownership
  • More command examples.