TPM

The Trusted Platform Module (TPM) is a hardware device that is basically a secure micro-controller (a chip) with added cryptographic functionality. The purpose of the Trusted Platform Module is to work with supporting software and firmware to prevent unauthorized access to a notebook computer and devices. The TPM contains a hardware engine to perform up to 2048-bit RSA encryption/decryption.

The TPM uses its built-in RSA engine during digital signing and key wrapping operations. Most modern computers have a TPM or you can purchase as a module if you build your own computer. Today software platforms including Microsoft BitLocker and many others automatically use a TPM to transparently encrypt your files.

The TPM Technical Specification

The TPM technical specification is an International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC) standard and was first proposed by the Trusted Computing Group (TCG) consortium in 2008 (see Trusted Platform Module Summary).

TPM 2.0

The TPM 2.0 library specification was released October, 2014. Changes and enhancements compared to the previous TPM version include support for additional cryptographic algorithms, enhancements to TPM applications, enhanced authorization mechanisms, simplified TPM management and additional platform security capabilities.

Vangie Beal
Vangie Beal
Vangie Beal is a freelance business and technology writer covering Internet technologies and online business since the late '90s.

Related Articles

@ Sign

Pronounced at sign or simply as at, this symbol is used in e-mail addressing to separate the user' name from the user's domain name,...

Munging

(MUHN-jing) Munging (address munging), is the act of altering an email address posted on a Web page to make it unreadable to bots and...

How to Create an RSS Feed

In the second installment of RSS how-to, we look at some of the nonrequired (optional) channel and item tags, discuss RSS specifications in-depth and...

Dictionary Attack

(n.) (1) A method used to break security systems, specifically password-based security systems, in which the attacker systematically tests all possible passwords beginning with...

ScalaHosting

ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...