Trusted platform module basics : using TPM in embedded systems /
Main Author: | |
---|---|
Format: | Book |
Language: | English |
Published: |
Oxford :
Newnes,
2006.
|
Series: | Embedded technology series
|
Subjects: | |
Online Access: | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=173590 |
Table of Contents:
- TCG prerequisites
- Cryptographic basics
- Overview of the TPM architecture
- Root-of-trust, the TPM endorsement key
- Key hierarchy and key management
- Platform configuration registers
- TPM command message overview
- Rolling nonces and anti-replay protection
- Command authorization, typical
- Command authorization, atypical
- The initialization and low-level command suite
- Compliance vectors and their purpose
- Establishing a TPM owner
- Owner-authorized command suite
- The key management command suite
- The RSA encryption and decryption command suite
- The TPM signature command
- The RNG command suite
- The PCR command suite
- The TPM capability and self-test command suite
- The key migration and secret management suite
- The trusted device driver
- TPM system deployment initialization
- Migrating to version 1.2 of the TPM
- Example one : TPM ownership
- More command examples.