Details
The Trusted Platform Module (TPM) as specified by the TCG provides many security functions including special registers (called Platform Configuration Registers - PCRs) which hold various measurements in a shielded location in a manner that prevents spoofing. Measurements consist of a cryptographic hash using a Secure Hashing Algorithm (SHA). The current TPM specification uses the SHA-1 hashing algorithm. SHA-1 is a cryptographic hash function designed by the United States National Security Agency (NSA) and published by the United States National Institute of Standards and Technology (NIST) as a U.S. Federal Information Processing Standard (FIPS). A characteristic of the cryptographic hash algorithm is that (for all practical purposes) the hash result (referred to as a hash digest or a hash) of any two modules will only produce same hash value if the modules are identical.
Read more about this topic: Trusted Execution Technology
Famous quotes containing the word details:
“Then he told the news media
the strange details of his death
and they hammered him up in the marketplace
and sold him and sold him and sold him.
My death the same.”
—Anne Sexton (19281974)
“Working women today are trying to achieve in the work world what men have achieved all alongbut men have always had the help of a woman at home who took care of all the other details of living! Today the working woman is also that woman at home, and without support services in the workplace and a respect for the work women do within and outside the home, the attempt to do both is taking its tollon women, on men, and on our children.”
—Jeanne Elium (20th century)