Trusted Platform Module

[6] The group continues work on the standard incorporating errata, algorithmic additions and new commands, with its most recent edition published as 2.0 in November 2019.

[8][9][10] The TPM 2.0 policy authorization includes the 1.2 HMAC, locality, physical presence, and PCR.

In this context, "integrity" means "behaves as intended", and a "platform" is any computer device regardless of its operating system.

Examples of such use can be found in Linux Unified Key Setup (LUKS),[33] BitLocker and PrivateCore vCage memory encryption.

Another example of platform integrity via TPM is in the use of Microsoft Office 365 licensing and Outlook Exchange.

[35] Full disk encryption utilities, such as dm-crypt, can use this technology to protect the keys used to encrypt the computer's storage devices and provide integrity authentication for a trusted boot pathway that includes firmware and the boot sector.

In the future, this concept could be co-located on an existing motherboard chip in computers, or any other device where the TPM facilities could be employed, such as a cellphone.

The Trusted Computing Group (TCG) has certified TPM chips manufactured by Infineon Technologies, Nuvoton, and STMicroelectronics,[37] having assigned TPM vendor IDs to Advanced Micro Devices, Atmel, Broadcom, IBM, Infineon, Intel, Lenovo, National Semiconductor, Nationz Technologies, Nuvoton, Qualcomm, Rockchip, Standard Microsystems Corporation, STMicroelectronics, Samsung, Sinosun, Texas Instruments, and Winbond.

[44] In 2018 Intel open-sourced its Trusted Platform Module 2.0 (TPM2) software stack with support for Linux and Microsoft Windows.

[46][47] Infineon funded the development of an open source TPM middleware that complies with the Software Stack (TSS) Enhanced System API (ESAPI) specification of the TCG.

[56] The author is right that, after achieving either unrestricted physical access or administrative privileges, it is only a matter of time before other security measures in place are bypassed.

Writing for Neowin, Sayan Sen quoted Torvalds' bitter comments and called him "a man with a strong opinion.

"[63] In 2010 Christopher Tarnovsky presented an attack against TPMs at Black Hat Briefings, where he claimed to be able to extract secrets from a single TPM.

He was able to do this after 6 months of work by inserting a probe and spying on an internal bus for the Infineon SLE 66 CL PC.

In 2015 as part of the Snowden revelations, it was revealed that in 2010 a US CIA team claimed at an internal conference to have carried out a differential power analysis attack against TPMs that was able to extract secrets.

As a result, all systems depending upon the privacy of such weak keys are vulnerable to compromise, such as identity theft or spoofing.

[73] In 2018, a design flaw in the TPM 2.0 specification for the static root of trust for measurement (SRTM) was reported (CVE-2018-6622).

It allows an adversary to reset and forge platform configuration registers which are designed to securely hold measurements of software that are used for bootstrapping a computer.

Vendors include: There are also hybrid types; for example, TPM can be integrated into an Ethernet controller, thus eliminating the need for a separate motherboard component.

Since July 28, 2016, all new Microsoft device models, lines, or series (or updating the hardware configuration of an existing model, line, or series with a major update, such as CPU, graphic cards) implement, and enable by default TPM 2.0.

As seen from the table, the TPM stacks abstract the operating system and transport layer, so the user could migrate one application between platforms.

Components of a Trusted Platform Module complying with the TPM version 1.2 standard
Screenshot of tpm2-software showing the reading of Platform Configuration Registers (PCRs), the getrandom result taken from TPM device, and TPM version (2.0)
Trusted Platform Module installed on a mainboard