Re: [Fed-Talk] FW: Army to require built-in security
Re: [Fed-Talk] FW: Army to require built-in security
- Subject: Re: [Fed-Talk] FW: Army to require built-in security
- From: Amanda Walker <email@hidden>
- Date: Sat, 29 Jul 2006 10:32:31 -0400
On Jul 27, 2006, at 6:03 PM, Joel Esler wrote:
But what makes us think that a chip is going to protect the machine?
Among other things, the TPM is a tamper resistant and tamper evident
key repository and RSA cipher engine. This allows a key to be
associated with a machine in such a manner that the main CPU has no
access to the key material, but can have the TPM perform encryption
and decryption on its behalf (for example, for challenge/response
authentication mechanisms).
This turns out to be very useful; one way to think of it is as a
smart card that's soldered into the machine. The biggest uses are to:
- Allow software to challenge the machine for authorization (as Mac
OS X for Intel does--in effect, the machine itself becomes an
authorization dongle).
- Allow software to answer authentication and authorization
challenges for network services without placing private key material
somewhere vulnerable to spyware, viruses, etc.
Amanda Walker
email@hidden
_______________________________________________
Do not post admin requests to the list. They will be ignored.
Fed-talk mailing list (email@hidden)
Help/Unsubscribe/Update your Subscription:
This email sent to email@hidden