Get A Practical Guide to TPM 2.0: Using the New Trusted Platform PDF

By Will Arthur, David Challener

ISBN-10: 1430265833

ISBN-13: 9781430265832

ISBN-10: 1430265841

ISBN-13: 9781430265849

A sensible advisor to TPM 2.0: utilizing the relied on Platform Module within the New Age of Security is a straight-forward primer for builders. It exhibits safety and TPM innovations, demonstrating their use in genuine functions that the reader can try out out.

Simply positioned, this publication is designed to empower and excite the programming group to move out and do cool issues with the TPM. The strategy is to ramp the reader up speedy and preserve their interest.A useful consultant to TPM 2.0: utilizing the depended on Platform Module within the New Age of Security explains defense recommendations, describes the TPM 2.0 structure, and offers code and pseudo-code examples in parallel, from extremely simple options and code to hugely advanced techniques and pseudo-code.

The ebook contains directions for the to be had execution environments and actual code examples to get readers up and speaking to the TPM speedy. The authors then support the clients extend on that with pseudo-code descriptions of helpful purposes utilizing the TPM.

Show description

Read Online or Download A Practical Guide to TPM 2.0: Using the New Trusted Platform Module in the New Age of Security PDF

Best security & encryption books

Hardening Cisco Routers (O'Reilly Networking) - download pdf or read online

As a community administrator, auditor or architect, you recognize the significance of securing your community and discovering safeguard options you could enforce speedy. This succinct booklet departs from different safeguard literature through focusing completely on how you can safe Cisco routers, instead of the whole community.

Read e-book online Writing Secure Code: Practical Strategies and Proven PDF

Preserve black-hat hackers at bay with the information and strategies during this pleasing, eye-opening booklet! builders will the way to padlock their purposes during the whole improvement process—from designing safe purposes to writing powerful code which may face up to repeated assaults to trying out purposes for protection flaws.

Get Computer Forensics with FTK PDF

With the rise of digital crimes and the necessity to continuously audit the correct use of assets, businesses desire certified execs and acceptable instruments to hold out those actions. The FTK platform, having the ability to acquire and learn electronic proof speedy and with integrity, is a smart strategy to support execs in achieving those targets.

Additional info for A Practical Guide to TPM 2.0: Using the New Trusted Platform Module in the New Age of Security

Sample text

This in turn makes it easier to design a system on which multiple applications appear to have unfettered access to a TPM. 0 family of TPMs. PCR values typically represent the state of the machine, with lower-numbered PCRs representing the process of booting of the system and higher-numbered ones representing events after the kernel has booted. Both keys and data can be locked to certain PCRs having particular values, an action called sealing. But if keys or data are locked to a PCR that represents the BIOS of a system, it’s tricky to upgrade the BIOS.

Such an upgrade prevented the TPM from being able to unseal the KEK. Although the random-number backup sufficed for recovery in this case, Microsoft decided it would make more sense for an administrator doing the BIOS upgrade, who already had access to the decrypted data, to have a means to temporarily leave the fulldisk encryption key in the clear while the BIOS upgrade was performed and then reseal it to the TPM’s new PCR values after the BIOS upgrade. It is important to realize that making things easy for the user at a small cost to security (leaving the drive open for the brief time while a BIOS upgrade was taking place) is usually a good tradeoff.

Secure generation of keys: Having a hardware random-number generator is a big advantage when creating keys. A number of security solutions have been broken due to poor key generation. • Secure storage of keys: Keeping good keys secure, particularly from software attacks, is a big advantage that the TPM design brings to a device. • NVRAM storage: When an IT organization acquires a new device, it often wipes the hard disk and rewrites the disk with the organization’s standard load. Having NVRAM allows a TPM to maintain a certificate store.

Download PDF sample

A Practical Guide to TPM 2.0: Using the New Trusted Platform Module in the New Age of Security by Will Arthur, David Challener


by Joseph
4.0

Rated 4.87 of 5 – based on 50 votes