A Practical Guide to TPM 2.0: Using the Trusted Platform by Will Arthur, David Challener, Kenneth Goldman

By Will Arthur, David Challener, Kenneth Goldman

A realistic consultant to TPM 2.0: utilizing the depended on Platform Module within the New Age of protection is a straight-forward primer for builders. It indicates defense and TPM thoughts, demonstrating their utilization in genuine functions that the reader can try out out.

Simply positioned, this ebook is designed to empower and excite the programming group to move out and do cool issues with the TPM. The strategy is to ramp the reader up quick and maintain their curiosity. a realistic consultant to TPM 2.0: utilizing the relied on Platform Module within the New Age of safeguard explains safety ideas, describes TPM 2.0 structure, and gives coding examples in parallel starting with extremely simple innovations and easy code to hugely advanced ideas and code.

The booklet comprises entry to a stay execution setting (secure, hosted virtualization) and genuine code examples to get readers up and speaking to the TPM quick. The authors then aid the clients extend on that with actual examples of important apps utilizing the TPM.

Show description

Read Online or Download A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security PDF

Best security books

Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions

The intersection of politics, legislation, privateness, and safeguard within the context of machine know-how is either delicate and complicated. desktop viruses, worms, Trojan horses, spy-ware, desktop exploits, poorly designed software program, insufficient know-how legislation, politics and terrorism all of those have a profound impact on our day-by-day computing operations and behavior, with significant political and social implications.

Hacking Movable Type (ExtremeTech)

I bought this ebook after searching it on the book shop and studying approximately the entire nifty additional downloads to be had on the book's "companion web site. " wager what? the entire stories are correct - there isn't any web site. it truly is now could of 2007 and the positioning nonetheless says it truly is "coming soon," without rationalization. The better half website (which sounded very cool within the book)was by no means built and never merely is there no rationalization on the web site - yet no longer even the following at Amazon the place Matt Haughey and the opposite authors have the ability to jot down within the booklet web publication - or go away reviews to the reports in resolution to all these considering approximately what occurred.

Information Assurance in Computer Networks: Methods, Models and Architectures for Network Security International Workshop MMM-ACNS 2001 St. Petersburg, Russia, May 21–23, 2001 Proceedings

This ebook offers the refereed lawsuits of the overseas Workshop on Mathematical equipment, versions, and Architectures for community defense platforms, MMM-ACNS 2001, held in St. Petersburg in may well 2001. The 24 revised complete papers awarded including 5 invited contributions have been rigorously reviewed and chosen from 36 submissions.

Emergency planning for nuclear power plants

This e-book presents a historical past of emergency making plans with admire to nuclear strength plant injuries from the 1950’s to the 2000’s. It offers an outline of crucial strategies operating emergency planner should still understand, together with short overviews of the healthiness physics and plant engineering that applies to emergency making plans.

Additional resources for A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security

Sample text

The first applications to use the TPM were proprietary applications that were shipped with the machines that had the first versions of TPMs. These included IBM’s password manager and file and folder encryption, which used the TPM to store encryption keys. Dell, HP, and Infineon have their own varieties of these applications. Generally speaking, they work well, but are intended to focus on very specific usage models. The next type of applications that use TPMs use it through cryptographic service providers (CSPs).

The private key embedded in the chip identifies the card on which it resides, an authentication password or PIN is used to authenticate a person to the card, and together they form “the thing you have” and “the thing you know” for authentication. 0 smart card, as long as they all know the PIN. There is also nothing that ties the smart card to a particular machine, which is an advantage when the smart card is used as a proxy for identifying an individual instead of a machine. By embedding a private key mechanism in a personal computing device, that device can be identified.

This is not due to lack of software development kits for writing such software, because several of these kits exist. 2 When you’re building an application that will use a TPM, it is important to first decide if you are going to use the advanced facilities of the TPM beyond those that are exposed by PKCS or MS CAPI. If not, then it makes the most sense to write your application to these interfaces. This way, your application can be used on those machines with and without TPMs. But to use unique TPM features such as attestation, extended authorization, localities, an NVRAM locations, you have no choice but to use one of the custom TPM interfaces.

Download PDF sample

Rated 4.02 of 5 – based on 16 votes