tpm Questions
2
In Window, I'm trying to create a key in the TPM with the help of the NCrypt library and restrict the access to only my application in C++, but I get the error: "The security descriptor struct...
2
Solved
I am currently working on a small sample program using Crypto Next Generation (Windows Crypto API) to generate a key, store it in the TPM on my computer, encrypt some data and then retrieve it and ...
Perretta asked 15/4, 2020 at 1:7
1
Solved
It seems that both trusted computing and confidential computing can protect data in use.
Is trusted computing based on TPM and confidential computing based on Intel SGX?
Any other difference?
2
3
I am trying to
initialize the TPM
set an owner
create AIKs
Any help/link would be appreciated.
4
How can I encrypt bytes using a machine's TPM module?
CryptProtectData
Windows provides a (relatively) simple API to encrypt a blob using the CryptProtectData API, which we can wrap an easy to use ...
Cargian asked 4/3, 2015 at 19:6
1
Solved
I need to
run .exe on client machine, which will create key pair within TPM.
And then I will create CSR with public key part of key pair generated by TPM.
My concerns are how do i ensure that ...
1
So far I know that the TPM is using thermal noise for generating true random numbers. But I'm also sure that the TPM uses more sources for the entropy.
In that that keystroke timings, drive seek t...
2
Solved
I'd like to perform a TPM Seal operation in windows. I'm familiar with C++ programming but have no idea what libraries I'd even use.
I'm currently stuck with the following two questions:
C...
Armure asked 10/6, 2014 at 16:7
1
Solved
As there are 24 PCR's in TPM 1.2 specification. Some of these PCRs are reserved and cannot be extended by user's code. Below are the PCR Index their PCR Usage
CRTM, BIOS and Platform Extensions
P...
Marya asked 31/10, 2013 at 11:42
2
Solved
What is the difference between Intel TXT and TPM? What more Intel TXT has to offer as compared to TPM?
Basically, I wanted to know how TXT works? Any easy to follow literature for beginners will be...
Jacquejacquelin asked 21/10, 2013 at 16:34
7
Solved
At my company we are developing a large system, comprised of several servers.
The system is comprised from about 5 logical components. Data is stored in XMLs, MS SQL, and SQLite. It's a .Net system...
Revoice asked 1/2, 2011 at 21:29
1
Solved
I've been asked to implement what amounts to a license-dongle using TPM for an x86_64 appliance which has a TPM chip. Essentially what is desired is to ensure that software released for the applian...
3
Solved
I am wondering if it's possible to program TPM ( http://en.wikipedia.org/wiki/Trusted_Platform_Module ) present in most of Intel chips, in such a way to:
- decide what to store in the persistent m...
Wafd asked 7/12, 2011 at 9:17
2
Solved
I'm reading up on my upcoming project that involves using my laptop's TPM on authentication software written in Java.
A few entries came out on Google, but most of them are quite old, and I have n...
1
© 2022 - 2024 — McMap. All rights reserved.