1.TPM Keys
- Endorsement key for root of TPM trust
- Storage root key for top of key hierarchy
- Storage keys for key hierarchy and sealing
- Identity keys for certifiable signatures
- Binding keys for binding
- Signing keys for signing arbitrary data
- Legacy keys that can both sign and encrypt.
- There are several APIs and mechanisms for accessing the TPM
- These APIs require differing levels of understanding of the TPM
- Some mechanisms abstract away more TPM complexity than others
- The TSS abstracts some of the TPM complexities away
- If you learn the TPM basics and the TSS API, you can create secure applications
- The main goals of the TSS are:
– Provide synchronized access to the TPM
– Hide building command streams with appropriate byte ordering and alignment from the applications
– Manage TPM resources
– Release TPM resources when appropriate
– Manage application use of secrets and keys



- Creates an abstraction layer hiding OS-specific device driver interfaces from the TCS
- Single point of compatibility for TSS developers
- Allows the TPM vendor to get/set device driver capabilities
Now here are some details about how to actually use this stuff . . .
|
|