Data protection utilizing trusted platform module

Data protection has become a major requirement for computer systems which process sensitive information especially in daily commercial activities. It is mainly achieved through encryption based on software protections measures that have constantly shown lacks of security against attacks or malicious codes. In this paper we present and explore a real scenario for data encryption utilizing trusted computing technology and its core named trusted platform module (TPM). This new technology, which assists with encryption at the hardware level instead of the software, makes more difficult for intruders and attackers to break into the system and compromise the data stored there. The processes from activation of TPM to the encryption of data are investigated. At the end, an analysis of the advantages and limitations of protection has been made in respect to the functions of TPM and some other models as well.

[1]  Adi Shamir,et al.  Playing "Hide and Seek" with Stored Keys , 1999, Financial Cryptography.

[2]  Ed DeHart Data encryption , 2008, ACM Crossroads.