Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: Justa

Is that a rhetorical question? Do you understand the basics of a TPM? The TPM hash is generated when the TPM is first powered on. It is unique to the hardware configuration of the machine. Meaning the algorithm generated is like a fingerprint. It’s unique to the machine. The likelihood of the TPM hash being identical to another system, even one that is built identical to another, is infinitesimal.

There’s no root check-in. It’s not like a CA chain. The TPM IS the CA. It is the top-level certification authority for the machine. Hence the name Trusted Platform Module. It’s proof of the existence of the machine based on its unique fingerprint. The private key is generated by the newly-created hash, stored on the TPM, and it’s not even accessible by the owner.

So a 1024-bit hash, salted with whatever algorithm the manufacturer chooses, followed by a 1024-bit or greater private key means its basically inviolable. Even with the salt algorithm, the private key cannot be readily decrypted.


122 posted on 08/22/2013 11:16:22 AM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 119 | View Replies ]


To: rarestia

bump for later


127 posted on 08/22/2013 11:27:02 AM PDT by palmer (Obama = Carter + affirmative action)
[ Post Reply | Private Reply | To 122 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson