Is it safe to use a non-pcr key after verifying some pcr7 key is working find after os start on tpm2.0?

If we reboot an OS and want to sign something using TPM. And let’s say we want to secure the boot environment using pcr7 policy crypto key. Is it safe to use non-pcr policy key together with a pcr7 policy key?
More formally:

In the progra… Continue reading Is it safe to use a non-pcr key after verifying some pcr7 key is working find after os start on tpm2.0?

Posted in TPM

Is BitLocker susceptible to any known attacks other than bruteforcing when used with a very strong passphrase and no TPM?

I have learned about attacks where the BitLocker master key can be sniffed on its way from the CPU to the TPM using a logic analyzer. However, in computer configurations without TPMs, this is obviously not possible. Furthermore, as I under… Continue reading Is BitLocker susceptible to any known attacks other than bruteforcing when used with a very strong passphrase and no TPM?

Do microcontroller processors like Arm Cortex-M support the TPM’s Dynamic root of trust (similar to e.g. Intel TXT)?

The TPM (Trusted Platform Module) has a feature called dynamic root-of-trust. If i understand correctly a measurement of the current system is taken (to enable attestation) by the CPU and transmitted to the TPM. To make sure that the measu… Continue reading Do microcontroller processors like Arm Cortex-M support the TPM’s Dynamic root of trust (similar to e.g. Intel TXT)?

How safe are my app’s keys inside the TPM against other apps trying to impersonate mine?

This is a follow-up of these two questions about using the TPM to store application’s keys. While both have great answers, there is a specific aspect I am missing:
How safe are the keys inside the TPM against another (malicious) app trying… Continue reading How safe are my app’s keys inside the TPM against other apps trying to impersonate mine?