What is the difference betwen a Trusted Computing Base and a Root of Trust?

What is the difference betwen a Trusted Computing Base (TCB) and a Root of Trust (RoT)? Can both terms be used interchangeably?
A TCB is defined by the NIST as follows:

Totality of protection mechanisms within a computer system, including… Continue reading What is the difference betwen a Trusted Computing Base and a Root of Trust?

Using TPM to generate certificates associated with different users on the same device

I plan to use the TPM to generate CSR’s backed by a private key stored on the TPM. The CSR’s will then be signed by an external HSM.
Since a certificate is tied to a particular private key, how do you support multiple users on the same lap… Continue reading Using TPM to generate certificates associated with different users on the same device

What really is the difference between firmware TPM and a discrete one and should it be trusted more?

What really is the difference between a physical TPM and any implementation of a fTPM?
I get that both adhere to the same specification and in my mind should be the same thing, but then, I don’t understand why there even are 5 or so differ… Continue reading What really is the difference between firmware TPM and a discrete one and should it be trusted more?

What really is the difference between firmware TPM and a discreet one and should it be trusted more?

what really is the difference between a physical TPM and any implementation of a fTPM? I get that both adhere to the same specification and in my mind should be the same thing, but then, what is the advantage of the physical chip over firm… Continue reading What really is the difference between firmware TPM and a discreet one and should it be trusted more?

Root of Trust – The general Mechanism of how RoT Authenticates higher levels of software

I’ve been reading many research articles about RoT – Root of Trust – for establishing a chained root of trust going up from BIOS to the Kernel.
However, most of the article go briefly on how RoT works for different brands.
A good article o… Continue reading Root of Trust – The general Mechanism of how RoT Authenticates higher levels of software