Trusted Computing: Security and Applications

Eimear Gallery, Chris J. Mitchell
2009 Cryptologia  
The main objective of this paper is to highlight some of the major security and application issues confronting trusted computing technology. This technology, now present in a large proportion of new PCs and incorporating a wide range of cryptographic functionality, has the potential to have a major practical impact, but has not been widely discussed. This paper is an attempt to encourage greater debate about this technology and its possible implications. Following a brief introduction to the
more » ... tory of trusted computing, we provide a summary of its main features. This leads naturally to a consideration of the issues which may impede its use, including potential problems with its cryptographic components. Possible applications of the technology are then discussed. 1
doi:10.1080/01611190802231140 fatcat:slr52mewqrbxtg6orjxes4valy