From the course: IoT Product Security
Unlock this course with a free trial
Join today to access over 23,100 courses taught by industry experts.
Trusted Platform Module: Part 3
From the course: IoT Product Security
Trusted Platform Module: Part 3
Hi, I'm Matthew Clark. And this is Lesson 4.9: Trusted Platform Module, Part 3. In this lesson, we'll continue our discussion of TPM keys, including the attestation identity key and the storage root key. And we'll take a look at TPM ownership. In Lesson 4.7, we discovered that the TPM has three roots of trust. A root of trust for measurement, which is used during the measured root process and is responsible for measuring the platform's integrity state and storing that data into shielded locations known as the PCR. The root of trust for storage, which is used to securely store the storage root key and platform configuration register data. And the root of trust for reporting, which is used for attestation of the measured boot. In Lesson 4.8, we learned that there are three main keys used by the TPM, the endorsement key, which is created by the manufacturer, which is a long-term non-migratable asymmetric key, which is certified by a trusted platform module entity or TPME. And this is…
Contents
-
-
-
-
-
Foundations of trust: Part 110m 23s
-
(Locked)
Foundations of trust: Part 29m 6s
-
(Locked)
Foundations of trust: Part 39m 5s
-
(Locked)
Foundations of trust: Part 411m 29s
-
(Locked)
Encryption8m 39s
-
(Locked)
Trusted execution environment7m 57s
-
(Locked)
Trusted Platform Module: Part 17m 49s
-
(Locked)
Trusted Platform Module: Part 27m 53s
-
(Locked)
Trusted Platform Module: Part 39m 46s
-
(Locked)
Trusted Platform Module: Part 412m 50s
-
(Locked)
Hardware security9m 57s
-
(Locked)
DICE: Part 17m 45s
-
(Locked)
DICE: Part 29m 40s
-
(Locked)
Module 14 review10m 7s
-
-
-
-