Trusted Computing: Security and Applications

  • Authors:
  • Eimear Gallery;Chris J. Mitchell

  • Affiliations:
  • -;-

  • Venue:
  • Cryptologia
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

The main objective of this paper is to highlight some of the major security and application issues confronting trusted computing technology. This technology—now present in a large proportion of new PCs and incorporating a wide range of cryptographic functionality—has the potential to have a major practical impact, but it has not been widely discussed. This paper is an attempt to encourage greater debate about this technology and its possible implications. Following a brief introduction to the history of trusted computing, we provide a summary of its main features. This leads naturally to a consideration of the issues that may impede its use, including potential problems with its cryptographic components. Possible applications of the technology are then discussed.