Migration

This section provides a step-by-step description of the two migration processes, TCPA_MS_REWRAP and TCPA_MS_MIGRATE.

Starting Migration

Both migration methods have the same starting point, which is generating a data structure to prove that the TPM owner has authorized use of a particular destination or intermediary public key for a particular migration method (TCPA_MS_MIGRATE or TCPA_MS_REWRAP).

This first step enforces the privilege of the TPM owner to permit migration and minimizes the cost of a TPM. Most TPM capabilities need a maximum of two authorization sessions (see Chapter 4): TPM owner authorization and authorization to use a key, for example. In the case of migration, however, a total of three authorization sessions are required: ...

Get Trusted Computing Platforms: TCPA Technology in Context now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.