Generated by GPT-5-mini| Trusted Platform Module | |
|---|---|
![]() Raimond Spekking · CC BY-SA 4.0 · source | |
| Name | Trusted Platform Module |
| Acronym | TPM |
| Developer | Trusted Computing Group |
| Introduced | 2003 |
| Type | hardware security module |
Trusted Platform Module The Trusted Platform Module is a dedicated hardware component designed to provide secure cryptographic operations, device identity, and platform integrity verification. It is used across Microsoft Corporation, Intel Corporation, Advanced Micro Devices, IBM, and Apple Inc. systems to enable features in Windows Vista, Windows 10, Linux kernel, and Android (operating system). The module underpins authentication, encryption, and attestation workflows adopted by National Institute of Standards and Technology, European Union Agency for Cybersecurity, and enterprise deployments by Amazon Web Services, Google LLC, and Cisco Systems.
TPM provides hardware-based roots of trust, secure key storage, and measured boot capabilities that interact with platform firmware such as Unified Extensible Firmware Interface and legacy BIOS. Vendors like Dell Technologies, Lenovo, and HP Inc. integrate TPM chips alongside processors from Intel Corporation and Advanced Micro Devices to support features in Microsoft BitLocker, Apple FileVault, and LUKS. Standards bodies including the Trusted Computing Group and regulatory organizations such as National Institute of Standards and Technology define threat models and validation criteria used by governments like United States and agencies like European Commission in procurement.
Early concepts for hardware roots of trust trace to research at IBM and proposals in the late 1990s, evolving through industry consortium work at the Trusted Computing Group founded by Intel Corporation and Microsoft Corporation. The first TPM specification emerged in 2003, followed by revisions and major updates in responses to cryptographic advances from institutions like RSA (company), NIST, and research labs at University of Cambridge and Massachusetts Institute of Technology. Adoption accelerated with platform security initiatives such as Windows Vista requirements, cloud service integrations by Amazon Web Services and Google Compute Engine, and mobile device attestation in ecosystems led by Samsung Electronics and Qualcomm.
A TPM typically contains a secure microcontroller, non-volatile storage, cryptographic engines, and a random number generator compliant with standards from NIST and recommendations by Internet Engineering Task Force. Logical components include the endorsement key, storage root key, and platform configuration registers that interact with firmware interfaces like UEFI Secure Boot and management frameworks from Intel Active Management Technology and Dell iDRAC. Implementations may be discrete chips, firmware TPMs in silicon platforms from Intel Corporation and AMD, or virtualized TPM instances provided by hypervisors such as VMware ESXi, Microsoft Hyper-V, and KVM.
TPM enables asymmetric key generation, secure storage of keys, platform attestation, and sealed storage tied to platform measurements produced during boot sequences defined by UEFI and platform firmware. It supports cryptographic algorithms standardized by NIST and utilizes certificates issued by public certificate authorities like DigiCert and Let's Encrypt in attestation chains for enterprise identity managed by Microsoft Active Directory or Lightweight Directory Access Protocol directories. Features include measured boot for integrity reporting to services such as Azure Attestation, remote attestation for cloud orchestration by OpenStack, and disk encryption support for solutions like BitLocker and FileVault.
Specifications are published by the Trusted Computing Group, with multiple versions including 1.2 and 2.0 aligned to cryptographic standards from NIST and protocol work at the IETF and ISO. Commercial implementations are shipped by semiconductor manufacturers like Infineon Technologies, Nuvoton Technology, and STMicroelectronics, and platform vendors such as Dell Technologies and Lenovo. Open-source projects including tpm2-tools, TrouSerS, and components in the Linux kernel provide software stacks and APIs used by distributions from Red Hat and Canonical (company).
While TPM establishes a hardware root of trust endorsed by organizations like NIST and adopted by enterprises such as Goldman Sachs and JPMorgan Chase, critics cite concerns raised in analyses from researchers at University of Cambridge, Princeton University, and security firms like Kaspersky Lab and Symantec about supply-chain trust, firmware vulnerabilities, and misuse for vendor lock-in. Debates involve privacy advocates and regulatory bodies including Electronic Frontier Foundation and national legislators in the European Parliament over remote attestation, lawful access, and implications for user control—a discourse also reflected in directives from agencies like ENISA. Security evaluations reference threat modeling, red-team assessments from Google Project Zero, and certification schemes administered by Common Criteria.
TPM is used in full-disk encryption by Microsoft BitLocker and Apple FileVault, secure boot chains in platforms from Dell Technologies and HP Inc., enterprise authentication integrated with Microsoft Active Directory and Azure AD, and cloud workload attestation by Amazon Web Services and Microsoft Azure. Other uses include hardware-backed credential storage for devices in Internet of Things deployments by Siemens and Bosch, secure elements for payment terminals certified under schemes by EMVCo and identity verification in projects by Estonia and agencies like UK Government Digital Service. Optional Category:Computer security