Trusted Platform Modules
Why, When and How to Use Them

Cloth: 978 1 84919 893 6 / $120.00
 
Published: December 2016  

Publisher: The Institution of Engineering and Technology
400 pp., 6 1/8" x 9 1/5"
Trusted Platform Modules (TPMs) are small, inexpensive chips which provide a limited set of security functions. They are most commonly found as a motherboard component in laptops and desktops aimed at the corporate or government markets, but can also be found in many consumer-grade machines and servers or purchased as independent components.

This book describes the primary uses for TPMs and practical considerations such as: when TPMs can and should be used, when they shouldn’t be used, what advantages they provide and how to benefit from them.

Topics covered include:

* When to use a TPM
* TPM concepts and functionality
* Programming introduction
* Provisioning: getting the TPM ready to use
* First steps: TPM keys, machine authentication, data protection, attestation
* Other TPM features
* Software and specifications
* Troubleshooting
* Appendices contain basic cryptographic concepts, command equivalence, requirements charts and complete code samples.

Table of Contents:
1. Introduction
2. When to Use a TPM
3.TPM Concepts and Functionality
4. Programming Introduction
5. Provisioning: Getting the TPM Ready to Use
6. First Steps: TPM Keys
7. Machine Authentication
8. Data Protection
9. Attestation
10. Other TPM Features
11. Software, Specications, and More
12. Troubleshooting
13. Conclusion and Review:
A. Basic Cryptographic Concepts,
B. Command Equivalence & Requirements Charts and
C. Complete Code Samples



Share