Cryptographic Hardware

Trusted Platform Module (TPM)

Hardware device integrated into the hardware of a computer that's a dedicated crypto processor offers

  • secure generation of keys

  • Random Number generation

  • Remote attestation

  • Data binding and sealing

A TPM has unique secret RSA key burned into the hardware at the time of manuafcture which allows a To perform things like hardware authentication.

This can detect unauthorized hardware changes to a system.

Remote attestation:

is an idea authenticating. Its software and hardware configuration to a remote system. this enables the remote system to determine the integrity of the remote system.

This can be done by using a TPM, by generating a secure hash of the system configuration using the system

Last updated