TPM-and-Secure-Boot
TPM-and-Secure-Boot
BOOT 01
TRUSTED PLATFORM MODULE
(TMP)
A Trusted Platform Module (TPM)
is a security chip in modern
computers. It is designed to
securely store and manage
cryptographic keys and other
sensitive data. Think of it as a
small, specialized computer within
your computer that is specifically
focused on security. 02
03
CONCEPTS OF TPM
The Trusted Platform Module
(TPM) is based on several core
concepts that support its
ability to provide secure
cryptographic functions and
maintain system integrity.
These concepts are centered
around trust, secure storage,
and cryptographic functions.
04
CONCEPTS OF TPM
• Root of Trust: Ensure the system has
strong foundational security.
• Attestation: Showing that the system is
honest to people outside.
• Key Management: Secure generation,
storage, and use of cryptographic keys.
• Sealed Storage: Data can only be
accessed when the system is trusted.
• Measured Boot: System state data is
recorded and can be verified.
• Binding and Sealing: Secure and encrypt
data connected to a specific system and
05
location.
PURPOSE OF TPM
The Trusted Platform Module
(TPM) serves several
important purposes in
enhancing system security,
protecting sensitive
information, and ensuring
the integrity of platforms.
06
PURPOSE OF TPM
• System Integrity: Checks that the boot
and system components have not been
changed.
• Data Protection: Secure sensitive data by
using encryption and sealed storage.
• Authentication: Enables secure
authentication for users and devices using
hardware-based technology.
• Attestation: Provides evidence of the
system's reliability to external parties.
• Secure Key Management: Protects
cryptographic keys and digital certificates. 07
operations.
FEATURES OF TPM
• Cryptographic Functions: Generate,
store, and encrypt keys securely.
• Platform Configuration Registers
(PCRs): Store system measurements for
integrity checks.
• Sealed and Binding Storage: Protect
important information on the computer
to keep it safe from attackers.
• Measured and Secure Boot: Ensures
trusted boot process and software
integrity.
• Attestation: Demonstrates the integrity
of the system to remote parties. 16
FEATURES OF TPM
• Tamper Resistance: Physically
secure hardware, resistant to attacks.
• Encryption & Digital Signatures:
Supports data protection and
authentication.
• Multi-Factor Authentication:
Enhances authentication systems.
• Key Attestation: Checking where
cryptographic keys come from and
making sure they are safe.
• Privacy Support: Protects user
privacy and ensures security. 17
OPERATIONS OF TPM
The Trusted Platform Module
(TPM) helps make a system more
secure and reliable. It does this
by performing important tasks
like using secret codes for
security, managing keys, checking
that the system is working
properly, and confirming the
identity of users.
18
OPERATIONS OF TPM
• Encryption and Decryption: Perform
secure encryption and decryption of data.
• Digital Signatures: Generate digital
signatures for authentication and
integrity checks.
• Hashing and Integrity Measurement:
Hash data and measure system integrity
by recording component hashes during
the boot process.
• Sealing and Unsealing: Encrypt data so
that it can only be accessed in a trusted
system.
• Binding and Unbinding: Lock up
information on one computer so that no 19
actions.
SECURE BOOT
21
WHAT IS SECURE BOOT?
• Secure boot is a security feature found in
modern computers that helps prevent
malicious software from loading during
the boot process. It works by verifying the
integrity of the system's firmware and
operating system components before
allowing them to run.
23
HOW DOES SECURE BOOT WORK?
When you power on your device,
secure boot checks the digital
signatures of the bootloader and
operating system. If the
signatures are valid and match the
trusted keys stored in the system,
the boot process continues. If not,
secure boot halts the process to
protect against tampering. 24
HOW SECURE BOOT HELPS PROTECT AGAINST
UNAUTHORIZED OR MALICIOUS CODE?
It functions by verifying the digital
signatures of the bootloader and
operating system, allowing only
trusted and signed code to be
executed during startup. This
prevents unauthorized or
malicious software from
compromising the system early in
the boot sequence. 25
Windows
startup process
26
26