Verified Document

Computer Systems And Computer Research Paper

¶ … TMP (Trusted Platform Module) is an international standard dedicated to secure hardware by integrating the security cryptographic keys into hardware devices. In other words, the TMP is a secure cryptoprocessor integrated into the computer motherboards enabling full disk encryption without using extremely long paraphrases. When a user buys a personal computer, the TPM is built into the computer's motherboard with the goal to offer security into the computer systems by generating the encryptions keys to protect the data in the drive. With the TPM in place, an attacker cannot remove the file from the systems or access the files elsewhere. Moreover, the TPM stores the encryption key that requires a user to login with a password to get access to the Windows and computer system. The objective of this paper is to explore the concept the Trusted Platform Module, and the working protocol of the TMP technology.

Working Process of Trusted Platform Module

A recent trend in the computer security has moved towards the Trusted Platform Module to enhance the security of the computer systems. A platform is trusted if it behaves for its intended purpose. The TPM is a low-cost security system delivered to enhance a safe computing environment. Implemented in the IC (integrated circuit), it is a building block to enhance secure authentication. The TPM assists in securing computer devices using the private keys generated by the TPM. The TPM also strengthens data protection and secure data...

TPM creates stores and uses the encryption keys to protect the drive lock passwords as well as protecting the certificate private keys. Moreover, the system stored the master encryption key in the Trusted Platform Module, which can only be accessed by TPM. The security protocol of the TMP can prevent the computer systems from starting if the TPM is missing in the system. Moreover, an error message is generated if the TPM is missing.
The TPM becomes popular because there is a flaw in the existing system. Jared et al. (2011) argue that the attackers take the advantages of the existing flaws to exploit the vulnerabilities, thus, TPM has been introduced to offer security platform into the computer processors by securing the bootstrapping. Moreover, the TPM allows the remote party to enhance an effective verification to ensure that only an authorized code run on the systems. Since the TPM has been introduced, the TPM security protocol has already been integrated and deployed on over 300 million computers. For example, the Microsoft uses the TPM known as "Microsoft's Bitlocker Drive Encryption software" to secure the Windows. (Jared, Dmitry, Jason et al. 2011). The TMP also offers the physical security to make the technology tampered resistance by the malicious software.

TPM Keys

The key advantage of the TPM is that a user can generate, store and use the cryptographic keys to offer security to the systems. A silicon chip carries out the TPM functions that include storing the platform integrity, store and generate keys. The silicon chips also create the digital signatures to enhance the effective security…

Sources used in this document:
Reference

Francis, A., Daniel., R. M. and Vindoh, E.S.E. (2013). TPM: A More Trustworthy Solution to Computer Security, Engineering and Computer 3 (3): 99 -- 103.

Hans, B., & Infineon Technologies, A. (2008). Introduction Trusted Computing: The TCG Trusted Platform Module Specification. Infineon Technologies AG, Germany.

Jared, S., Dmitry, P., Jason, L., Nael, A., & Jesse, E. (2011). TPM-SIM: A Framework for Performance Evaluation of Trusted Platform Modules. Conference: Proceedings of the 48th Design Automation Conference: 236-241.
Cite this Document:
Copy Bibliography Citation

Related Documents

Computer Science Fundamentals Too Often the Mechanistic
Words: 1481 Length: 5 Document Type: Essay

Computer Science Fundamentals Too often the mechanistic are taken for granted in computer science. The technology has been around long enough now, that many take for granted the great powers that computers and computing technology has afforded modern man and his society. The fundamental characteristics of any successful endeavor should be investigated to help identify a pattern and produce learning and gather information. The purpose of this essay is identify and explain

Computer Forensic Tools: The Use of Computers
Words: 1019 Length: 3 Document Type: Essay

Computer Forensic Tools: The use of computers in homes, schools, offices, and other places has increased in the past few years due to technological developments. As computers have become important components of modern communication, their increased use has also led to the emergence of computer crimes. Computer crimes basically involve the use of a computer system to carry out an illegal activity. In attempts to lessen the frequency and impact of

Computer System Administrator Systems Administrator
Words: 1661 Length: 4 Document Type: Literature Review

Retrieved from http://books.google.co.ke/books?id=3Tla6d153uwC&printsec=frontcover&dq=Encyclopedia+of+computer+science+and+technology&hl=en&sa=X&ei=dZH_UNjcIcHQhAeRg4C4Bw&ved=0CCwQ6AEwAA Kizza, J.M. (2005). Computer Network Security. New York, NY: Springer. Retrieved from http://books.google.co.ke/books?id=HsawoKBLZOwC&printsec=frontcover&dq=Computer+Network+Security&hl=en&sa=X&ei=uZH_UJn-NMbNhAeWroDYCA&ved=0CCwQ6AEwAA#v=onepage&q=Computer%20Network%20Security&f=false Musumeci, G.-P. D., & Loukides, M. (2002). System performance tuning: [help for Unix system administrators]. Beijing [u.a.: O'Reilly. Retrieved from http://books.google.co.ke/books?id=L4oyNrsFBbsC&printsec=frontcover&dq=System+performance+tuning&hl=en&sa=X&ei=C5L_UKjmNonMhAen8ICoBw&ved=0CDIQ6AEwAA Adelstein, T., & Lubanovic, B. (2007). Linux system administration. Sebastopol, Calif: O'Reilly. Retrieved from http://books.google.co.ke/books?id=- jYe2k1p5tIC&printsec=frontcover&dq=Advanced+system+administration&hl=en&sa=X &ei=fpP_UM6EN8HMhAff9YC4DQ&ved=0CD0Q6AEwBA#v=onepage&q=Advanced %20system%20administration&f=false Verma, D.C. (2009). Principles of computer systems and network management. Dordrecht: Springer. Retrieved http://books.google.co.ke/books?id=dUiNGYCiWg0C&printsec=frontcover&dq=Principles+of+computer+systems+and+network+management&hl=en&sa=X&ei=i5T_UIG3IMaBhQfF2YD4Bg&ved=0CDQQ6AEwAA#v=onepage&q=Principles%20of%20computer%20systems%20and%20network%20management&f=false Whyte, E. (2004, Feb 09). Be a system

Computer Security: Corporate Security Documentation Suitable for
Words: 5280 Length: 19 Document Type: Essay

Computer Security: Corporate Security Documentation Suitable for a Large Corporation Item (I) in-Depth Defense Measures (II) Firewall Design (III) Intrusion Detection System (IV) Operating System Security (V) Database Security (VI) Corporate Contingency of Operation (VII) Corporate Disaster Recovery Plan (VIII) Team Members and Roles of Each (IX) Timeline with Goal Description (X) Data Schema (XI) Graphical Interface Design (XII) Testing Plan (XIII) Support Plan (XIV) Schematics Computer Security: Corporate Security Documentation Suitable for a Large Corporation (I) In-Depth Defense Measures Information Technology (IT) Acceptable Use Policy The intentions of

Computer Forensics: Generally, Forensics Can Be Described
Words: 917 Length: 3 Document Type: Essay

Computer Forensics: Generally, forensics can be described as the process of using scientific knowledge in the gathering, evaluation, and presentation of evidence to the courts. Since forensics deal with the presentation of evidence to the courts, it basically deals with the analysis and recovery of hidden evidence. In this case, the hidden evidence may be in several forms including fingerprints, blood stains, and DNA evidence. On the other hand, computer forensics

Computer Dependence the Story of Pandora's Box
Words: 1586 Length: 6 Document Type: Essay

Computer Dependence The story of Pandora's Box reveals the dangers that technology brings along with its many gifts. Today, some very interesting cultural changes are beginning to take hold of society that stems from the dependence on technology and the way that it is interwoven into culture. The purpose of this essay is to examine the relationship between computer technology and the corresponding dependence that is created by this relationship. This

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now