From the course: IoT Product Security

Unlock this course with a free trial

Join today to access over 23,100 courses taught by industry experts.

Trusted Platform Module: Part 2

Trusted Platform Module: Part 2

From the course: IoT Product Security

Trusted Platform Module: Part 2

Hi, I'm Matthew Clark. And this is Lesson 4.8: Trusted Platform Module, Part 2. In this lesson, we will review the TPM roots of trust, and we'll learn about the TPM keys, including the endorsement key. Finally, we'll take a look at the trusted platform module entity. In Lesson 4.7: we discovered that the TPM has three roots of trust. The root of trust for measurement, which is used during the measured boot process and is responsible for measuring the platform's integrity state and storing that data into shielded locations known as the PCR. The root of trust for storage, which is used to securely store both the storage root key and those platform configuration registers. And the root trust for reporting, which is used during the attestation of the measured boot and provides reports of integrity measurements from the PCR in the RTS. In this lesson, we'll learn that there are three main keys used by the TPM, the endorsement key, which is created by the manufacturer; the root storage key,…

Contents