A Practical Guide to TPM 2.0: Using the New Trusted Platform by Will Arthur, David Challener

By Will Arthur, David Challener

A useful consultant to TPM 2.0: utilizing the depended on Platform Module within the New Age of Security is a straight-forward primer for builders. It exhibits protection and TPM suggestions, demonstrating their use in actual purposes that the reader can test out.

Simply positioned, this e-book is designed to empower and excite the programming neighborhood to move out and do cool issues with the TPM. The technique is to ramp the reader up quick and hold their interest.A sensible advisor to TPM 2.0: utilizing the depended on Platform Module within the New Age of Security explains safety suggestions, describes the TPM 2.0 structure, and offers code and pseudo-code examples in parallel, from extremely simple innovations and code to hugely advanced innovations and pseudo-code.

The e-book comprises directions for the to be had execution environments and genuine code examples to get readers up and speaking to the TPM speedy. The authors then support the clients extend on that with pseudo-code descriptions of beneficial purposes utilizing the TPM.

Show description

Read Online or Download A Practical Guide to TPM 2.0: Using the New Trusted Platform Module in the New Age of Security PDF

Best security & encryption books

PCI Compliance

Id robbery has been gradually emerging in recent times, and bank card info is likely one of the no 1 pursuits for id robbery. With a number of items of key info. equipped crime has made malware improvement and machine networking assaults extra expert and higher defenses are essential to safeguard opposed to assault.

CCSP CSI Exam Cram 2 (Exam Cram 642-541)

The examination Cram approach to learn makes a speciality of precisely what you want to get qualified now. during this booklet you are going to learn the way to:* establish the knowledge resources in a community which needs to be safe* realize which threats observe to which community resources* decide on a suitable know-how to mitigate a probability* observe community security in layers* pick out the right safeguard product to guard the community ingress from the net* DMZ* VPNs* Campus servers* administration community* Branches* guard community units from misuse via hackers* decide upon substitute safeguard designs

Public-key Cryptography: Baltimore

This choice of articles grew out of an expository and educational convention on public-key cryptography held on the Joint arithmetic conferences (Baltimore). The ebook presents an creation and survey on public-key cryptography for people with huge mathematical adulthood and basic mathematical wisdom.

Additional resources for A Practical Guide to TPM 2.0: Using the New Trusted Platform Module in the New Age of Security

Sample text

It is designed in layers so that at the lowest level, direct access to the TPM is still possible. Common design patterns that use a cryptographic coprocessor are made particularly easy to use at the highest application level programming interface. However, there are still some ground rules that every application developer should remember when developing applications that use a TPM. Rocks to Avoid When Developing TPM Applications When using the TPM in an application, there are two major pitfalls to avoid.

0 it’s called a launch control policy. Like the public root key used in Unified Extensible Firmware Interface (UEFI) secure-boot implementations, this is used by the system owner to specify the state they want the machine to be in when it goes through a controlled launch, usually of a hypervisor. The advantage over the UEFI secure-boot method is that with the TPM, the end user has full control over the contents of the NVRAM storage. • Storage for decryption keys used before the hard disk is available: For example, a key used for a self-encrypting drive.

0. The Platform Crypto Provider Most Windows programs use cryptography through a set of interfaces called Cryptography Next Generation (CNG). CNG provides a uniform library for performing both software-based and hardware (such as High Security Module) based cryptography. Windows 8 lets you specify the TPM as a key protector for a subset of TPM-supported cryptography by specifying use of the Platform Crypto Provider. The Platform Crypto Provider has been extended to include a few specific TPM-like behaviors, such as quoting and key certification.

Download PDF sample

Rated 4.91 of 5 – based on 50 votes