Questions tagged [tpm]

A Trusted Platform Module (TPM) is a secure coprocessor found in some x86-based computers that provides cryptographic operations and system integrity measurements.

A Trusted Platform Module is a secure cryptoprocessor defined by the Trusted Computing Group and found on some x86 processors. It performs platform measurements that an operating system can use to ensure platform integrity, thus implementing a form of secure boot. The TPM also implements some common cryptographic algorithms. Each TPM contains a unique key and can therefore be used to authenticate the platform and to encrypt data that will not be decryptable without that particular TPM.

TrouSerS is an open-source TCG software stack (a TPM API). Microsoft's Bitlocker on Windows Vista and above leverages the TPM when present.

230 questions
0
votes
1 answer

Non-identified algorithm for RSA decryption in tpm-emulator

While analyzing the source code of tpm-emulator I found that the RSA key decryption uses an algorithm that is unknown to me. The original file with this mystery is located in rsa.c, where the rsa_private(...) function resides. The shortened content…
0
votes
1 answer

Unbinding in key hierarchy

Lets say we have a key hierarchy as follows: SRK -> SK1 -> SK2 -> BK With the public part of BK, I decrypt a symmetric AES key. For a proper decryption, the private key of SK2 is needed in the TPM. To obtain the private key SK2 the private key of…
fliX
  • 153
  • 6
0
votes
5 answers

How to make sure nobody has read this!

Is there any computer/server which would allow me to get "guaranteed read access history" for files? For example, suppose I made a file with my plaintext passwords and simply wanted to make sure that those bits have not been read by anyone. In…
-1
votes
1 answer

TPMs available on mobile with application access

I am looking for a mobile device, preferably a smartphone or a tablet, that contains a TPM (v1.2 or 2.0) and provides application access to it through an API. Does anyone know if any such devices exist?
user1094206
  • 107
  • 1
-1
votes
1 answer

How secure is TPM password only encrypted removable drive?

There are some similar threads but no one directly addressing this question. Is there any built in protection against TPM password only protected/encrypted second drive or USB drives using brute force attack? When drive can be connected to any…
JoeJ
  • 1
1 2 3
15
16