{"id":5817,"date":"2012-08-26T20:20:38","date_gmt":"2012-08-27T01:20:38","guid":{"rendered":"http:\/\/bucktownbell.com\/?p=5817"},"modified":"2012-08-26T20:21:34","modified_gmt":"2012-08-27T01:21:34","slug":"trusted-platform-module","status":"publish","type":"post","link":"http:\/\/bucktownbell.com\/?p=5817","title":{"rendered":"Trusted Platform Module"},"content":{"rendered":"<blockquote><p>Software can use a Trusted Platform Module to authenticate hardware devices. Since each TPM chip has a unique and secret <a title=\"RSA (algorithm)\" href=\"http:\/\/en.wikipedia.org\/wiki\/RSA_%28algorithm%29\">RSA<\/a> key burned in as it is produced, it is capable of performing platform <a title=\"Authentication\" href=\"http:\/\/en.wikipedia.org\/wiki\/Authentication\">authentication<\/a>.<\/p>\n<p>Generally, pushing the security down to the hardware level in conjunction with software provides more protection than a software-only solution. However even where a TPM is used, a key is still vulnerable while a software application that has obtained it from the TPM is using it to perform encryption\/decryption operations, as has been illustrated in the case of a <a title=\"Cold boot attack\" href=\"http:\/\/en.wikipedia.org\/wiki\/Cold_boot_attack\">cold boot attack<\/a>.<\/p><\/blockquote>\n<p>via <a href=\"http:\/\/en.wikipedia.org\/wiki\/Trusted_Platform_Module\">Trusted Platform Module &#8211; Wikipedia, the free encyclopedia<\/a>.<\/p>\n<blockquote><p><span class=\"reference-text\"><span class=\"citation web\"><a class=\"external text\" href=\"http:\/\/www.trustedcomputinggroup.org\/resources\/tpm_main_specification\" rel=\"nofollow\">&#8220;Trusted Platform Module (TPM) Specifications&#8221;<\/a>. Trusted Computing Group<span class=\"printonly\">.<\/span><\/span><\/span><\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>Software can use a Trusted Platform Module to authenticate hardware devices. Since each TPM chip has a unique and secret RSA key burned in as it is produced, it is capable of performing platform authentication. Generally, pushing the security down &hellip; <a href=\"http:\/\/bucktownbell.com\/?p=5817\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[25],"tags":[261,778],"class_list":["post-5817","post","type-post","status-publish","format-standard","hentry","category-pc-issues","tag-definition","tag-tpm"],"_links":{"self":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/5817","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5817"}],"version-history":[{"count":2,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/5817\/revisions"}],"predecessor-version":[{"id":5821,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/5817\/revisions\/5821"}],"wp:attachment":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5817"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=5817"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=5817"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}