Trusted Platform Module (TPM)

Trusted platform module (TPM) is a computing term that refers to a specific type of cryptographic processor—also known as a computer chip—and its specific operation. TPM chips (also known as TPM security devices) store secure encryption keys that are used in computer hardware, firmware, and software authentication. TPMs are central components to what is known as trusted computing (TC), in which a computer’s hardware and software is designed to behave in an expected and predictable manner.

90558485-100646.jpg

Overview

TPM technology was designed by the Trusted Computer Group (TCG), a consortium of major computer technology manufacturers including IBM, Microsoft, and Cisco. TCG was originally formed with the goal of creating TPM chips—a standardized, industry-wide platform module specification and operating system security. The aim of TCG and the trusted computing initiative is to establish accepted computer security standards for all computer technology manufacturers. The first iteration of TMP chips are listed as International Electrotechnical Commission Standard (ISO/ISE) 11889.

TPM chips function by using two types of computer encryption algorithms known as the endorsement key (EK) and the attestation identity key (AIK). The EK works in conjunction with a user or administrator-specified password to protect computers from unauthorized users. The AIK protects operating systems against unauthorized firmware or software and the illicit modification of its unique firmware and software. It does so by verifying specific number codes with external servers. Discrepancies in AIKs result in operation failure and act as a security measure against unsanctioned users. TPMs are used concurrently with antivirus software, biometric verification, and firewalls to protect computers and computer networks from hackers, malware, viruses, and other security threats. TPM chips are installed on the motherboards PCs. Although Apple computers used TPM chips for a period, Apple Inc. discontinued their use in 2006.

Bibliography

Challener, David, Kent Yoder, Ryan Catherman, David Safford, and Leendert Van Doorn. A Practical Guide to Trusted Computing. Indianapolis: IBM Press, 2008. Print.

Daniel, R. M., and A. Francis. “Towards a Trust Envisioned Cyber Security.” International Journal of Innovation and Applied Studies 2.4 (2013): 540-46. Print.

Gollmann, Dieter. Computer Security. New York: Wiley, 2011. Print.

Jackson, William. “Engineer Shows How to Crack a ‘Secure’ TPM Chip.” GCN. Public Sector Media Group, 2 Feb. 2010. Web. 21 Oct. 2013.

Markantonakis, Konstantinos, and Keith Mayes. Secure Smart Embedded Devices, Platforms and Applications. [N.p.]: Springer, 2014. Digital file.

Nisan, Noam. The Elements of Computing Systems: Building a Modern Computer from First Principles. Cambridge: MIT P, 2005. Print.

Rogers, Michael. “Let’s See Some ID, Please.” NBC News. National Broadcasting Company, 13 Dec. 2005. Web. 21 Oct. 2013.

Pearson, Siani. Trusted Computing Platforms: TCPA Technology in Context. Upper Saddle River, New Jersey: Prentice Hall, 2002. Print.

Vacca, John R. Computer and Information Security Handbook. San Francisco: Morgan, 2009. Print.

Winter, Johannes, and Kurt Dietrich. “A Hijacker’s Guide to Communication Interfaces of the Trusted Platform Module.” Computers and Mathematics with Applications 65.5 (2013): 748+. Print.