Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

A Practical Guide to TPM 2.0Keys

A Practical Guide to TPM 2.0: Keys [As a security device, the ability of an application to use keys while keeping them safe in a hardware device is the TPM’s greatest strength. The TPM can both generate and import externally generated keys. It supports both asymmetric and symmetric keys. Chapter 2 covered the basic principles behind these two key types.] http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png

Loading next page...
 
/lp/springer-journals/a-practical-guide-to-tpm-2-0-keys-07y3RbUl3F

References (0)

References for this paper are not available at this time. We will be adding them shortly, thank you for your patience.

Publisher
Apress
Copyright
© Will Arthur and David Challener 2015
ISBN
978-1-4302-6583-2
Pages
119 –135
DOI
10.1007/978-1-4302-6584-9_10
Publisher site
See Chapter on Publisher Site

Abstract

[As a security device, the ability of an application to use keys while keeping them safe in a hardware device is the TPM’s greatest strength. The TPM can both generate and import externally generated keys. It supports both asymmetric and symmetric keys. Chapter 2 covered the basic principles behind these two key types.]

Published: Jan 23, 2015

Keywords: Elliptic Curve Cryptography; Primary Seed; Authorization Policy; Persistent Storage; Platform Configuration Register

There are no references for this article.