![]() The most commonly referenced use case for the TPM chip is ensuring boot integrity. ![]() Security functions can leverage the TPM for random number generation the use of symmetric, asymmetric, and hashing algorithms and secure storage of cryptographic keys and message digests. The TPM chip allows for hardware-based cryptographic operations. If included, a TPM chip is typically found on a system’s motherboard. ![]() Not all computer manufacturers employ TPM chips, but the adoption has steadily increased. Joshua Feldman, in Eleventh Hour CISSP® (Third Edition), 2017 Trusted Platform ModuleĪ trusted platform module (TPM) chip is a processor that can provide additional security capabilities at the hardware level.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |