Computer Systems and Computer Research Paper

Total Length: 1079 words ( 4 double-spaced pages)

Total Sources: 1+

Page 1 of 4

TMP (Trusted Platform Module) is an international standard dedicated to secure hardware by integrating the security cryptographic keys into hardware devices. In other words, the TMP is a secure cryptoprocessor integrated into the computer motherboards enabling full disk encryption without using extremely long paraphrases. When a user buys a personal computer, the TPM is built into the computer's motherboard with the goal to offer security into the computer systems by generating the encryptions keys to protect the data in the drive. With the TPM in place, an attacker cannot remove the file from the systems or access the files elsewhere. Moreover, the TPM stores the encryption key that requires a user to login with a password to get access to the Windows and computer system.

The objective of this paper is to explore the concept the Trusted Platform Module, and the working protocol of the TMP technology.

Working Process of Trusted Platform Module

A recent trend in the computer security has moved towards the Trusted Platform Module to enhance the security of the computer systems. A platform is trusted if it behaves for its intended purpose. The TPM is a low-cost security system delivered to enhance a safe computing environment. Implemented in the IC (integrated circuit), it is a building block to enhance secure authentication. The TPM assists in securing computer devices using the private keys generated by the TPM. The TPM also strengthens data protection and secure data stored on the printer. TPM creates stores and uses the encryption keys to protect the drive lock passwords as well as protecting the certificate private keys. Moreover, the system stored the master encryption key in the Trusted Platform Module, which can only be accessed by TPM. The security protocol of the TMP can prevent the computer systems from starting if the TPM is missing in the system.

Stuck Writing Your "Computer Systems and Computer" Research Paper?

Moreover, an error message is generated if the TPM is missing.

The TPM becomes popular because there is a flaw in the existing system. Jared et al. (2011) argue that the attackers take the advantages of the existing flaws to exploit the vulnerabilities, thus, TPM has been introduced to offer security platform into the computer processors by securing the bootstrapping. Moreover, the TPM allows the remote party to enhance an effective verification to ensure that only an authorized code run on the systems. Since the TPM has been introduced, the TPM security protocol has already been integrated and deployed on over 300 million computers. For example, the Microsoft uses the TPM known as "Microsoft's Bitlocker Drive Encryption software" to secure the Windows. (Jared, Dmitry, Jason et al. 2011). The TMP also offers the physical security to make the technology tampered resistance by the malicious software.

TPM Keys

The key advantage of the TPM is that a user can generate, store and use the cryptographic keys to offer security to the systems. A silicon chip carries out the TPM functions that include storing the platform integrity, store and generate keys. The silicon chips also create the digital….....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Computer Systems And Computer" (2016, November 17) Retrieved May 18, 2024, from
https://www.aceyourpaper.com/essays/computer-systems-computer-2163164

Latest MLA Format (8th edition)

Copy Reference
"Computer Systems And Computer" 17 November 2016. Web.18 May. 2024. <
https://www.aceyourpaper.com/essays/computer-systems-computer-2163164>

Latest Chicago Format (16th edition)

Copy Reference
"Computer Systems And Computer", 17 November 2016, Accessed.18 May. 2024,
https://www.aceyourpaper.com/essays/computer-systems-computer-2163164