- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi Team,
I am researching on enhancing security. Is it possible to reprogram OPTIGA TPM?
Solved! Go to Solution.
- Labels:
-
OPTIGA™ TPM
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi @KavitaJhajharia ,
TPM firmware is developed according to TCG (Trusted Computing Group) standard.
As an end user you can only use the APIs to perform certain functions on your host side computer or systems (like uC etc.) but you cannot modify the TPM firmware to implement your own crypto.
Regards
Sharath
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi @KavitaJhajharia ,
Could you specify what you mean by "reprogram"?
Applications use TPM functionality by calling its API and TPM can be firmware updated but cannot be programed.
Thanks,
Sneha
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Thanks Sneha,
I want to induce one more symmetric key encryption algorithm (lighter than AES) in TPM.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi @KavitaJhajharia ,
TPM firmware is developed according to TCG (Trusted Computing Group) standard.
As an end user you can only use the APIs to perform certain functions on your host side computer or systems (like uC etc.) but you cannot modify the TPM firmware to implement your own crypto.
Regards
Sharath
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Thanks Sharath,
Is there any way I can implement TPM either on FPGA, Raspberry pi or may be something else?
in https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=7298&context=etd TPM is implemented on FPGA. I am not getting the steps on how to implement it.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
TPM is more advanced and comes with secure HW. You can implement something that 'emulates' TPM in SW (say in Raspberry Pi etc.), but it is of course not as secure as TPM or any other HW based solution. TPM is also certified by Trusted Computing Group (TCG), so from a compliance perspective as well, the 'emulated' solution won't work.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Sure Sharath, I know it will not be a standard TPM. But I want to do some experiments with TPM (preferably H/W, although S/W also I can check). It will be nice if you can suggest me what and where should I search.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Unfortunately TPM 'emulation' using publicly available materials is out of scope for this forum.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Ok Sharath,
No problem, Thanks a ton.