Catálogo de publicaciones - libros

Compartir en
redes sociales


Título de Acceso Abierto

A Practical Guide to TPM 2.0: Using the New Trusted Platform Module in the New Age of Security

Resumen/Descripción – provisto por la editorial

No disponible.

Palabras clave – provistas por la editorial

Computer science

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No requiere 2015 Directory of Open access Books acceso abierto
No requiere 2015 SpringerLink acceso abierto

Información

Tipo de recurso:

libros

ISBN impreso

978-1-4302-6583-2

ISBN electrónico

978-1-4302-6584-9

Editor responsable

Springer Nature

País de edición

Reino Unido

Fecha de publicación

Tabla de contenidos

History of the TPM

Will Arthur; David Challener; Kenneth Goldman

■■■

Pp. 1-5

Basic Security Concepts

Will Arthur; David Challener; Kenneth Goldman

■■■

Pp. 7-22

Quick Tutorial on TPM 2.0

Will Arthur; David Challener; Kenneth Goldman

■■■

Pp. 23-37

Existing Applications That Use TPMs

Will Arthur; David Challener; Kenneth Goldman

Even though more than 1 billion TPMs are deployed in the market, and they exist on almost all commercial PCs and servers, very few people know about them. And many people who do know about TPMs are surprised to discover that many applications are written for them. There are also a large number of ways to easily write applications that take advantage of TPM 1.2 devices. Because TPM 2.0 devices are just beginning to appear on the market, it’s perhaps not surprising that not as many applications can use TPM 2.0 directly. The purpose of this book is to enable you to write programs that take advantage of all the features of TPM 2.0, both basic and advanced.

Pp. 39-50

Navigating the Specification

Will Arthur; David Challener; Kenneth Goldman

■■■

Pp. 51-69

Execution Environment

Will Arthur; David Challener; Kenneth Goldman

■■■

Pp. 71-76

TPM Software Stack

Will Arthur; David Challener; Kenneth Goldman

This book is primarily about TPM 2.0 devices. However, a TPM without software is like a car with a full tank of gas but no driver; it has great potential but isn’t going anywhere. This chapter, in preparation for the rest of the book, introduces you to the TPM’s “driver”, the TPM Software Stack (TSS). A good understanding of this topic will enable you to understand subsequent code examples in this book.

Pp. 77-96

TPM Entities

Will Arthur; David Challener; Kenneth Goldman

A TPM 2.0 is an item in the TPM that can be directly referenced with a handle. The term encompasses more than objects because the specification uses the word to identify a very specific subset of entities. This can be confusing, so this chapter briefly describes all of the entity types: permanent entities (hierarchies, the dictionary attack lockout mechanism, and PCRs); nonvolatile entities (NVRAM indexes), which are similar to permanent entities; objects (keys and data); and volatile entities (sessions of various types).

Pp. 97-104

Hierarchies

Will Arthur; David Challener; Kenneth Goldman

A is a collection of entities that are related and managed as a group. Those entities include permanent objects (the hierarchy handles), primary objects at the root of a tree, and other objects such as keys in the tree. NV indexes belong to a hierarchy but aren’t in a tree. Entities, other than permanent entities, can be erased as a group.

Pp. 105-118

Keys

Will Arthur; David Challener; Kenneth Goldman

As a security device, the ability of an application to use keys while keeping them safe in a hardware device is the TPM’s greatest strength. The TPM can both generate and import externally generated keys. It supports both asymmetric and symmetric keys. Chapter 2 covered the basic principles behind these two key types.

Pp. 119-135