Uses
The
United States Department of Defense (DoD) specifies that "new computer assets (e.g., server, desktop, laptop, thin client, tablet, smartphone, personal digital assistant, mobile phone) procured to support DoD will include a TPM version 1.2 or higher where required by
DISA STIGs and where such technology is available." DoD anticipates that TPM is to be used for device identification, authentication, encryption, and device integrity verification.
[11]
Platform integrity
The primary scope of TPM is to assure the integrity of a platform. In this context, "integrity" means "behave as intended", and a "platform" is any computer device regardless of its
operating system. It is to ensure that the
boot process starts from a trusted combination of hardware and software, and continues until the operating system has fully booted and
applications are running.
The responsibility of assuring said integrity using TPM is with the firmware and the operating system. For example,
Unified Extensible Firmware Interface (UEFI) can use TPM to form a
root of trust: The TPM contains several Platform Configuration Registers (PCRs) that allow secure storage and reporting of security-relevant metrics. These metrics can be used to detect changes to previous configurations and decide how to proceed. Good examples can be found in
Linux Unified Key Setup (LUKS),
[12] BitLocker and
PrivateCore vCage memory encryption. (See below.)
Another example of platform integrity via TPM is in the use of
Microsoft Office 365 licensing and Outlook Exchange.
[13]
An example of TPM use for platform integrity is the
Trusted Execution Technology (TXT), which creates a chain of trust. It could remotely attest that a computer is using the specified hardware and software.
[14]
Disk encryption
Full disk encryption utilities, such as
dm-crypt and
BitLocker, can use this technology to protect the keys used to encrypt the computer's storage devices and provide integrity
authentication for a trusted boot pathway that includes firmware and
boot sector.
[15]
Password protection
Operating systems often require
authentication (involving a
password or other means) to protect keys, data or systems. If the authentication mechanism is implemented in software only, the access is prone to
dictionary attacks. Since TPM is implemented in a dedicated hardware module, a dictionary attack prevention mechanism was built in, which effectively protects against guessing or automated dictionary attacks, while still allowing the user a sufficient and reasonable number of tries. Without this level of protection, only passwords with high complexity would provide sufficient protection.
Other uses and concerns
Any application can use a TPM chip for:
Other uses exist, some of which give rise to
privacy concerns. The "physical presence" feature of TPM addresses some of these concerns by requiring BIOS-level confirmation for operations such as activating, deactivating, clearing or changing ownership of TPM by someone who is physically present at the console of the machine.
[18][19]