Securely Store Your Credentials And Cryptographic Keys In TPM 2.0 (2024)

A Trusted Platform Module (TPM)can securely storecryptographic keysthat are specific to the host system and provide restricted access to the stored keys and secrets. You can never read out private keys, or in other words retrieve them as is from the TPM. Let’s say you need to generate a signature: you can indicate the private key you wish to use from the TPM to sign the message. You can then verify the signature with the corresponding public key. This way keys remain secure in TPM even if the host system is infected with malware.

Now let us look at the two categories of keys in a TPM:

1. Non-migratable keys

These are the unique keys that are bound to a specific TPM and cannot be migrated outside of a TPM. We saw in a previousblogthat persistent hierarchies (endorsem*nt, platform and storage) of TPM have a seed of their own. We can create a unique primary key in a hierarchy using its seed and a template, as shown infigure 1 below. This primary key will be the root key for all keys generated thereafter and effectively links those keys in a key hierarchy.

The template specifies the key type, size, algorithms and unique data that the user provides. The generated primary key remains in the volatile memory until the user makes it persistent. The Key Derivation Function (KDF) is fixed, which means that the same seed and the same template will generate the same key. Multiple primary keys can be generated by changing the unique data of the template. This way, we can always regenerate the keys rather than storing them persistently in the TPM.

Securely Store Your Credentials And Cryptographic Keys In TPM 2.0 (2)

Fig. 1:Primary key generation in TPM 2.0.

TPM 2.0is shipped with a set of unique endorsem*nt keys (ECC and RSA key pairs) that are maintained inside the chip. The private part of the key cannot be accessed by the user or the software. These endorsem*nt keys are pre-provisioned by the manufacturer and are unique to every TPM and cannot be exported or migrated from the TPM. This forms the basis of endorsem*nt key hierarchy.

2. Migratable keys

These are the keys that are not specific to a TPM and can be migrated outside of a TPM with right owner authorization. The public and private portions of the key can be exposed to other components such as software, processes and users. Primary keys for restricted storage, encryption and signing can be generated from the storage primary seed and can be used to encrypt other non-root keys. This hierarchical implementation can be used by the user to create a key store containing different keys for different use cases with a single initial root key.

tpm2_createprimary’ command is used to derive primary keys from the seed of corresponding hierarchy and ‘tpm2_evictcontrol’ command can make the key persistent.

Additionally, we can store 7 persistent keys (permanent until flushed by the user) and 3 transient keys onOPTIGATPM 2.0 (SLB9670). So 7 keys, each 2048 bit, can be stored within Non-Volatile Memory (NVM) and 3 keys, each 2048 bit, can be stored within Random Access Memory (RAM) of the TPM.

NVM is the general-purpose memory in TPM that can be used to store user credentials, user data andX.509 certificates. Each area in NVRAM is addressed by a handle/index. There are a few reserved handles as defined in theTCG specificationfor accessing TPM manufacturer-installed Endorsem*nt Key (EK) certificates. Handle 0x1c00002stores the RSA EK certificate while 0x1c0000a stores the ECC EK certificate in NVM.OPTIGATPM 2.0 (SLB9670)has an additional space of 6962 bytes for storing anything the user wishes to store.

Refer to the followinglinkfor examples on NVM definition and writing data into it.


Sneha Prahalad

(all posts)
Sneha Prahalad is a senior engineer at Infineon Technologies.

Leave a Reply

Securely Store Your Credentials And Cryptographic Keys In TPM 2.0 (2024)
Top Articles
BlackBull Markets Avis mars 2024 - Broker Fiable ?
How to Get Out of Debt With the Debt Snowball Plan
English Bulldog Puppies For Sale Under 1000 In Florida
Katie Pavlich Bikini Photos
Gamevault Agent
Pieology Nutrition Calculator Mobile
Hocus Pocus Showtimes Near Harkins Theatres Yuma Palms 14
Hendersonville (Tennessee) – Travel guide at Wikivoyage
Compare the Samsung Galaxy S24 - 256GB - Cobalt Violet vs Apple iPhone 16 Pro - 128GB - Desert Titanium | AT&T
Vardis Olive Garden (Georgioupolis, Kreta) ✈️ inkl. Flug buchen
Craigslist Dog Kennels For Sale
Things To Do In Atlanta Tomorrow Night
Non Sequitur
Crossword Nexus Solver
How To Cut Eelgrass Grounded
Pac Man Deviantart
Alexander Funeral Home Gallatin Obituaries
Shasta County Most Wanted 2022
Energy Healing Conference Utah
Geometry Review Quiz 5 Answer Key
Hobby Stores Near Me Now
Icivics The Electoral Process Answer Key
Allybearloves
Bible Gateway passage: Revelation 3 - New Living Translation
Yisd Home Access Center
Home
Shadbase Get Out Of Jail
Gina Wilson Angle Addition Postulate
Celina Powell Lil Meech Video: A Controversial Encounter Shakes Social Media - Video Reddit Trend
Walmart Pharmacy Near Me Open
Marquette Gas Prices
A Christmas Horse - Alison Senxation
Ou Football Brainiacs
Access a Shared Resource | Computing for Arts + Sciences
Vera Bradley Factory Outlet Sunbury Products
Pixel Combat Unblocked
Movies - EPIC Theatres
Cvs Sport Physicals
Mercedes W204 Belt Diagram
Mia Malkova Bio, Net Worth, Age & More - Magzica
'Conan Exiles' 3.0 Guide: How To Unlock Spells And Sorcery
Teenbeautyfitness
Where Can I Cash A Huntington National Bank Check
Topos De Bolos Engraçados
Sand Castle Parents Guide
Gregory (Five Nights at Freddy's)
Grand Valley State University Library Hours
Holzer Athena Portal
Hello – Cornerstone Chapel
Stoughton Commuter Rail Schedule
Selly Medaline
Latest Posts
Article information

Author: Delena Feil

Last Updated:

Views: 6358

Rating: 4.4 / 5 (45 voted)

Reviews: 84% of readers found this page helpful

Author information

Name: Delena Feil

Birthday: 1998-08-29

Address: 747 Lubowitz Run, Sidmouth, HI 90646-5543

Phone: +99513241752844

Job: Design Supervisor

Hobby: Digital arts, Lacemaking, Air sports, Running, Scouting, Shooting, Puzzles

Introduction: My name is Delena Feil, I am a clean, splendid, calm, fancy, jolly, bright, faithful person who loves writing and wants to share my knowledge and understanding with you.