![]() ![]() Each TPM has a master wrapping key, called the storage root key, which is stored within the TPM itself. ![]() ![]() This process, often called wrapping or binding a key, can help protect the key from disclosure. The TPM is installed on the motherboard of a computer, and it communicates with the rest of the system by using a hardware bus.Ĭomputers that incorporate a TPM can create cryptographic keys and encrypt them so that they can only be decrypted by the TPM. This article for the IT professional provides a description of the components of the Trusted Platform Module (TPM 1.2 and TPM 2.0) and explains how they are used to mitigate dictionary attacks.Ī Trusted Platform Module (TPM) is a microchip designed to provide basic security-related functions, primarily involving encryption keys. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |