O'Reilly logo

Trusted Computing Platforms: TCPA Technology in Context by Graeme Proudler, David Plaquin, Liqun Chen, Boris Balacheff, Siani Pearson

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Basic Cryptographic Primitives

TCPA makes use of the following cryptographic primitives:

  • Random number generation

  • Key generation

  • Encryption (both asymmetric and symmetric)

  • Hash functions (also called hashing operations)

  • Digital signatures

  • Public key certificates (often referred to simply as certificates)

Generation of Random (or Pseudorandom) Bits and Sequences

The security of many cryptographic mechanisms that are used in TCPA depends upon the generation of unpredictable quantities. Examples include the primes in the RSA encryption and digital signature schemes, the secret key in the DES and 3DES encryption algorithms, and the nonce used in challenge-response integrity-checking systems. In all these cases, the quantities generated must be of sufficient ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required