Cryptographic Hardware
Trusted Platform Module (TPM)
Hardware device integrated into the hardware of a computer that's a dedicated crypto processor offers
secure generation of keys
Random Number generation
Remote attestation
Data binding and sealing
A TPM has unique secret RSA key burned into the hardware at the time of manuafcture which allows a To perform things like hardware authentication.
This can detect unauthorized hardware changes to a system.
Remote attestation:
is an idea authenticating. Its software and hardware configuration to a remote system. this enables the remote system to determine the integrity of the remote system.
This can be done by using a TPM, by generating a secure hash of the system configuration using the system
Last updated
Was this helpful?