Trusted Platform Module (TPM)
A Trusted Platform Module (TPM) is a specialized cryptographic processor embedded in computers, designed to enhance security by storing encryption keys used for hardware, firmware, and software authentication. This technology is integral to the concept of trusted computing, ensuring that a computer's operations are predictable and secure. Developed by the Trusted Computer Group (TCG), which includes major technology companies like IBM and Microsoft, TPMs aim to establish standardized security protocols across the industry.
The TPM operates using two primary encryption algorithms: the endorsement key (EK) and the attestation identity key (AIK). The EK safeguards the system against unauthorized access through a user-defined password, while the AIK helps protect against unauthorized modifications to the operating system by verifying codes with external servers. If discrepancies arise, the system fails to operate, thus enhancing security against potential threats.
TPMs are often utilized alongside antivirus programs, biometric verification, and firewalls, providing a robust defense against hackers and malware. While widely used in various PC motherboards, Apple computers only integrated TPM technology until its discontinuation in 2006. Overall, TPMs represent a significant advancement in the ongoing effort to secure computing environments.
On this Page
Subject Terms
Trusted Platform Module (TPM)
Trusted platform module (TPM) is a computing term that refers to a specific type of cryptographic processor—also known as a computer chip—and its specific operation. TPM chips (also known as TPM security devices) store secure encryption keys that are used in computer hardware, firmware, and software authentication. TPMs are central components to what is known as trusted computing (TC), in which a computer’s hardware and software is designed to behave in an expected and predictable manner.
![Trusted Platform Module on Asus motherboard P5Q PREMIUM By FxJ (Own work) [Public domain], via Wikimedia Commons 90558485-100646.jpg](https://imageserver.ebscohost.com/img/embimages/ers/sp/embedded/90558485-100646.jpg?ephost1=dGJyMNHX8kSepq84xNvgOLCmsE2epq5Srqa4SK6WxWXS)
Overview
TPM technology was designed by the Trusted Computer Group (TCG), a consortium of major computer technology manufacturers including IBM, Microsoft, and Cisco. TCG was originally formed with the goal of creating TPM chips—a standardized, industry-wide platform module specification and operating system security. The aim of TCG and the trusted computing initiative is to establish accepted computer security standards for all computer technology manufacturers. The first iteration of TMP chips are listed as International Electrotechnical Commission Standard (ISO/ISE) 11889.
TPM chips function by using two types of computer encryption algorithms known as the endorsement key (EK) and the attestation identity key (AIK). The EK works in conjunction with a user or administrator-specified password to protect computers from unauthorized users. The AIK protects operating systems against unauthorized firmware or software and the illicit modification of its unique firmware and software. It does so by verifying specific number codes with external servers. Discrepancies in AIKs result in operation failure and act as a security measure against unsanctioned users. TPMs are used concurrently with antivirus software, biometric verification, and firewalls to protect computers and computer networks from hackers, malware, viruses, and other security threats. TPM chips are installed on the motherboards PCs. Although Apple computers used TPM chips for a period, Apple Inc. discontinued their use in 2006.
Bibliography
Challener, David, Kent Yoder, Ryan Catherman, David Safford, and Leendert Van Doorn. A Practical Guide to Trusted Computing. Indianapolis: IBM Press, 2008. Print.
Daniel, R. M., and A. Francis. “Towards a Trust Envisioned Cyber Security.” International Journal of Innovation and Applied Studies 2.4 (2013): 540-46. Print.
Gollmann, Dieter. Computer Security. New York: Wiley, 2011. Print.
Jackson, William. “Engineer Shows How to Crack a ‘Secure’ TPM Chip.” GCN. Public Sector Media Group, 2 Feb. 2010. Web. 21 Oct. 2013.
Markantonakis, Konstantinos, and Keith Mayes. Secure Smart Embedded Devices, Platforms and Applications. [N.p.]: Springer, 2014. Digital file.
Nisan, Noam. The Elements of Computing Systems: Building a Modern Computer from First Principles. Cambridge: MIT P, 2005. Print.
Rogers, Michael. “Let’s See Some ID, Please.” NBC News. National Broadcasting Company, 13 Dec. 2005. Web. 21 Oct. 2013.
Pearson, Siani. Trusted Computing Platforms: TCPA Technology in Context. Upper Saddle River, New Jersey: Prentice Hall, 2002. Print.
Vacca, John R. Computer and Information Security Handbook. San Francisco: Morgan, 2009. Print.
Winter, Johannes, and Kurt Dietrich. “A Hijacker’s Guide to Communication Interfaces of the Trusted Platform Module.” Computers and Mathematics with Applications 65.5 (2013): 748+. Print.