Information Security: The Strength and Vulnerabilities of The Trusted Platform Module

956 Words2 Pages

Progressive technological development has paved the way for the ever increasing addition of multiple disparate devices. Devices which have the capability to connect to each other over a network affording them the ability to communicate with ease. Unfortunately the improved proficiency for communication carries with it a negative impact on information security. This detriment comes through the increased possibility of data loss and vulnerability exploitation. In this paper, we will seek to define one such measure to ensure security; by utilizing the Trusted Platform Module (TPM). We will also explore the strengths and vulnerabilities of the Trusted Platform Module as well as attacks against the TPM both in terms of hardware and software.

Background:
The term Trusted Platform Module pertains to a design model and the execution of said deign model established by the Trusted Compute Group. The Trusted Computer Group is a worldwide organizational body comprised of multiple computing technology vendors for the creation of industry hardware standards. The Trusted Computing Group establishes requirements and recommendations for the production of hardware elements which may be implemented to enhance the defensive capabilities of computing assets. These standards delineate rule sets for mobile devices, desktop systems, laptop computers, and servers as well as network infrastructure constraints. Stipulations concerning Application Programming Interfaces as well as the protocols required to function within a trusted computing state are additionally outlined. (Malipatlolla et al, 2013)
The Trusted Platform Module may be deployed in the form of hardware or as software component on a system that contains RSA encryption keys detailed to ...

... middle of paper ...

... 16-16). Retrieved from https://www.usenix.org/events/sec04/tech/full_papers/sailer/sailer.pdf
Malipatlolla, S. & Huss, S. & Shoufan, A. (2013). Sustainable trusted computing: A novel approach for a flexible and secure update of cryptographic engines on a trusted platform module.

Mason, S. (2005). Trusted Computing: Trusting your computer to be trusted. Computer Fraud & Security, 20057-
11. doi:10.1016/S1361-3723(05)00146-6

McGill, K. (2013). Trusted Mobile Devices: Requirements for a Mobile Trusted Platform Module. Johns Hopkins Apl
Technical Digest, 32(2), 544-554.

Osborn, J., & Challener, D. (2013). Trusted platform module evolution. Johns Hopkins Apl Technical Digest, 32(2),
536-543

Winter, J., & Dietrich, K. (2012). A hijacker's guide to communication interfaces of the trusted platform module.
Computers & Mathematics With Applications, 65(5), 748-761.

More about Information Security: The Strength and Vulnerabilities of The Trusted Platform Module

Open Document