- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi all,
I want to secure the RootCA/Keys from being tampered with or altered on the device.
How to do a Proof of Concept for the same, proving RootCA/Keys generated by TPM9672 cannot be tampered?
TPM9672 can wrap keys and password-protected "tpm2tss-genkey -a rsa -s 2048 ./tpm2/tpm_wrapped_keys/client. Key -p passw0rd" but is not able to conclude POC.
Thank You!
Solved! Go to Solution.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi @Sneha_P
Thank you for the information provided. It's really helpful.
I'm working on it. The Root of Trust for Storage can fulfill the requirements for Proof of Concept.
I will let you know if any further information is needed.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi @Dev_2048,
OPTIGA TPMs are TCG compliant and the hardware and firmware are evaluated by CC (Common Criteria) and FIPS. According to TCG Protection Profile, TPM 2.0 products demonstrate FIPS 140-2 Level 2 and EAL4+ CC certification making it tamper-resistant.
TCG Protection Profile for PC Client Specific TPM 1.2 Version 1.3 Revision 116 .
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi @Sneha_P
Thank you for the information provided. It's really helpful.
I'm working on it. The Root of Trust for Storage can fulfill the requirements for Proof of Concept.
I will let you know if any further information is needed.