Abstract
The design of TPM2.0 is dictated by a host of requirements and constraints. It is paramount that the use of Trusted Computing to protect a computer user’s data should continue to be controllable, and that Trusted Computing should continue to help protect privacy. At the same time, TPM2.0 must help protect platform services from attacks, be able to use a variety of cryptographic algorithms, and work when there is no local IT support desk. TPM2.0 must also be compatible with the plethora of types of modern computing platform, including virtualised platforms.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Only those that require platform authorisation, which is described later.
- 2.
This book must not be construed as advice or guidance on any legal matter.
- 3.
This book must not be construed as legal advice or guidance on any FIPS matter.
Reference
NIST’s Special Publication 800-57, “Recommendation for Key Management – Part 1: General (Revision 3)”, Table 2 “Comparable strengths”, 2012.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Proudler, G., Chen, L., Dalton, C. (2014). TPM2 Requirements. In: Trusted Computing Platforms. Springer, Cham. https://doi.org/10.1007/978-3-319-08744-3_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-08744-3_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-08743-6
Online ISBN: 978-3-319-08744-3
eBook Packages: Computer ScienceComputer Science (R0)