Questions tagged [tpm]

A Trusted Platform Module (TPM) is a secure coprocessor found in some PC-type computers that provides cryptographic operations and system integrity measurements.

The Trusted Platform Module is a secure cryptoprocessor defined by the Trusted Computing Group. It performs platform measurements that an operating system can use to ensure platform integrity, thus implementing a form of secure boot. The TPM also implements some common cryptographic algorithms. Each TPM contains a unique key and can therefore be used to authenticate the platform and to encrypt data that will not be decryptable without that particular TPM.

TrouSerS is an open-source TCG software stack (a TPM API). Microsoft's Bitlocker on Windows Vista and above leverages the TPM when present.

293 questions
142
votes
4 answers

How to encrypt bytes using the TPM (Trusted Platform Module)

How can I encrypt bytes using a machine's TPM module? CryptProtectData Windows provides a (relatively) simple API to encrypt a blob using the CryptProtectData API, which we can wrap an easy to use function: public Byte[] ProtectBytes(Byte[]…
Ian Boyd
  • 246,734
  • 253
  • 869
  • 1,219
9
votes
2 answers

Information needed to utilize TPM in Java

I'm reading up on my upcoming project that involves using my laptop's TPM on authentication software written in Java. A few entries came out on Google, but most of them are quite old, and I have no idea which is the best tutorial. So I'd like to…
segfault
  • 5,759
  • 9
  • 45
  • 66
8
votes
2 answers

Are Intel's PTT and TPM equivalent

Are Intel PTT (Intel Platform Trust Technology) and TPM chips functionally equivalent? If I had a board with a Intel processor that supported PTT, would I have the same functions as if I had a hardwired TPM chip, e.g support of Trousers, etc.? How…
user2881914
  • 407
  • 1
  • 4
  • 9
8
votes
7 answers

Protecting a system deployed in a "hostile" environment

At my company we are developing a large system, comprised of several servers. The system is comprised from about 5 logical components. Data is stored in XMLs, MS SQL, and SQLite. It's a .Net system(mostly) ,the components communicate using WCF, and…
AK_
  • 7,981
  • 7
  • 46
  • 78
7
votes
1 answer

How do you implement a platform-license "dongle" with TPM on Linux?

I've been asked to implement what amounts to a license-dongle using TPM for an x86_64 appliance which has a TPM chip. Essentially what is desired is to ensure that software released for the appliance can only run on the appliance itself such that if…
synthesizerpatel
  • 27,321
  • 5
  • 74
  • 91
6
votes
3 answers

Is it possible to program Intel's Trusted Platform Module

I am wondering if it's possible to program TPM ( http://en.wikipedia.org/wiki/Trusted_Platform_Module ) present in most of Intel chips, in such a way to: - decide what to store in the persistent memory - decide which cryptographic algorithms to…
Matteo
  • 7,924
  • 24
  • 84
  • 129
6
votes
1 answer

What is the difference between trusted computing and confidential computing?

It seems that both trusted computing and confidential computing can protect data in use. Is trusted computing based on TPM and confidential computing based on Intel SGX? Any other difference?
6
votes
3 answers

Controlling TPM with C#

I am trying to initialize the TPM set an owner create AIKs Any help/link would be appreciated.
TEmp69
  • 69
  • 1
  • 1
  • 2
6
votes
2 answers

What is the difference between Intel TXT and TPM?

What is the difference between Intel TXT and TPM? What more Intel TXT has to offer as compared to TPM? Basically, I wanted to know how TXT works? Any easy to follow literature for beginners will be highly appreciated!
Geek
  • 363
  • 1
  • 7
  • 14
5
votes
0 answers

Secure certificates using TPM in ubuntu

I have a requirement to secure AD machine based certificates(.cert,.pem,.key files) using TPM chip in Ubuntu operating system. The requirements are as follows: The certificates that are downloaded from AD to a specific directory needs to be…
LogicIO
  • 627
  • 7
  • 15
5
votes
1 answer

Help me with the simplest program for "Trusted" application

I hope anyone from the large community here can help me write the simplest "Trusted" program that I can expand from. I'm using Ubuntu Linux 9.04, with TPM emulator 0.60 from Mario Strasser (http://tpm-emulator.berlios.de/). I have installed the…
idazuwaika
  • 2,749
  • 7
  • 38
  • 46
5
votes
1 answer

How can a the extension of the PCR value be replicated with e.g. sha1sum?

this is somewhat related to the post in: Perform OR on two hash outputs of sha1sum I have a sample set of TPM measurements, e.g. the following: 10 1ca03ef9cca98b0a04e5b01dabe1ff825ff0280a ima 0ea26e75253dc2fda7e4210980537d035e2fb9f8 …
nico
  • 85
  • 6
4
votes
0 answers

Can the user TPM be accessed through javascript in the browser?

I heard the TPM can be used for DRM purposes. But currently is there a way to access this module through the browser? or is it simply for native applications. The only thing I came across searching was tpm-js, but this tutorial seems to be for js…
4
votes
0 answers

WCF How to change the Cryptographic Provider for an X.509 Certificate's Private Key

I am trying to extend WCF by following this how-to guide from microsoft. The basic idea is to use a hardware security module as the client-side private key holder, which means all cryptographic operations involving the client's private key must be…
Frank Liu
  • 1,466
  • 3
  • 23
  • 36
4
votes
1 answer

TPM and private key protection

Lets say I create a self-signed certificate in Powershell like this: New-SelfSignedCertificate -Provider "Microsoft Platform Crypto Provider" -Subject "CN=foobar" -KeyExportPolicy NonExportable -KeyAlgorithm RSA -KeyLength 2048 -CertStoreLocation…
joop s
  • 107
  • 1
  • 2
  • 9
1
2 3
19 20