Download A Practical Guide to TPM 2.0: Using the Trusted Platform by Will Arthur, David Challener, Kenneth Goldman PDF

By Will Arthur, David Challener, Kenneth Goldman

A pragmatic advisor to TPM 2.0: utilizing the relied on Platform Module within the New Age of defense is a straight-forward primer for builders. It indicates protection and TPM options, demonstrating their utilization in actual purposes that the reader can try out out.

Simply positioned, this booklet is designed to empower and excite the programming group to move out and do cool issues with the TPM. The technique is to ramp the reader up quick and hold their curiosity. a pragmatic consultant to TPM 2.0: utilizing the relied on Platform Module within the New Age of safety explains protection suggestions, describes TPM 2.0 structure, and gives coding examples in parallel starting with extremely simple options and easy code to hugely advanced techniques and code.

The e-book comprises entry to a stay execution setting (secure, hosted virtualization) and genuine code examples to get readers up and chatting with the TPM quick. The authors then aid the clients extend on that with actual examples of valuable apps utilizing the TPM.

Show description

Read Online or Download A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security PDF

Similar security books

Imaging for Forensics and Security: From Theory to Practice (Signals and Communication Technology)

Imaging for Forensics and protection: From concept to perform presents a close research of recent imaging and development acceptance recommendations for the knowledge and deployment of biometrics and forensic suggestions. those thoughts can be utilized for sensible suggestions to extend defense. the cloth features a choice of the new advances within the expertise starting from concept, layout, and implementation to functionality assessment of biometric and forensic structures.

Exceptional

Booklet through

Mutation breeding in chickpea : perspectives and prospects for food security

Examine on precipitated mutagenesis of pulses together with chickpea is much less universal in comparison to the only on cereals and henceforth the current paintings is pioneering within the box. The chickpea is likely one of the greatest grown pulse plants in India. the writer hopes that his booklet may also help to strengthen experiences on pulses, and within the long term, to lessen nutrition lack of confidence and malnutrition persisting in a number of constructing international locations

Additional info for A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security

Example text

First, the TPM (or another component on the motherboard) may die, or users may upgrade their equipment. If the motherboard is replaced, any keys that are locked to the TPM go away. Second, if data is locked to PCRs (a process called sealing), and the things measured into the PCRs are updated, that data is no longer unsealable. Both of these problems amount to the same thing: management of the keys and data locked to a TPM needs to be carefully considered. An example of how do this well is found in Microsoft’s BitLocker application, which first came out with Windows Vista Enterprise.

This lets software take advantage of a hardware interface that provides protection against software attacks by implementing cryptographic services in a separate memory space. Such CSPs are available for Windows for both CAPI and PKCS. These implementations are available from Security Innovation, Wave Systems, Infineon, and Lenovo for a fee. They’re often bundled with computers from major manufacturers. Infineon’s CSP is noteworthy in that it can find applications on the machine that can use its services and give the user the opportunity to use the 3IDE
CHANNELATTACKSOCCURWHENTHETIMEORPOWERITTAKESTOPERFORMACALCULATIONCANGIVEHINTS TOANATTACKERABOUTWHATKEYISBEINGUSED  40 CHAPTER 4 N EXISTING APPLICATIONS THAT USE TPMS TPM with them.

Wave Systems Embassy Suite Wave Systems has written software to a TPM-specific interface, rather than to a higher-level interface such as PKCS #11. It needed to be done that way, to take advantage of the TPM’s attestation capabilities. Because these capabilities aren’t addressed in any other crypto-coprocessor, they aren’t available in standard interfaces such as PKCS #11. Wave Systems uses the TCG TSS interface implemented in TrouSerS to talk to the TPM, manage the TPM owner password, create attestation identity keys (AIKs), and attest to those values via a standard called Trusted Network Connect, which communicates back to an administrative server.

Download PDF sample

Rated 4.82 of 5 – based on 49 votes
 

Author: admin