Intel TXT - Trusted Execution Technology
Daha Güvenli Sunucular İçin Yenilik
Trusted Platform Module and by using cryptographic techniques, measures environments security states. Provides security starting from very begining.
TXT is a hardware-based security technology whose main objective is to initiate a reliable operating system in measured hardware. The security stage ensures in three steps:
1- Approval of authenticity of a platform and its operating system,
2- Assuring that an operating system starts in a trusted environment and the operating system is being begun in this trusted environment,
3- Providing of a trusted operating system with additional security skills and not available to unproven systems.
This technology is created by Trusted Computing Group and the technology is based on LaGrande Technology to provide additional security to prevent third parties steal sensitive data from computers.
This Module Stores Security Measures
Trusted Platform Module (TPM)
This module is a microchip which designed to provide a special security for hardware by integrating cryptographic keys into the device. Today it has become an international standard.
How Does It Provide Security?
A computer that uses the TPM, generates encryption keys which can be solved by the same TPM only. This encryption keys are used while taking security measures. When the chip was in production, a special and secret RSA key for this chip was also produced and written into the chip. TPM generates and stores encryption keys which were re-encrypted with this special RSA key written into. Thus, additional measures are taken against the attacks to steal encryption key.
When the computer starts, TPM checks the operating system against situations that could create a security risk. Information about the changes on basic I/O system (BIOS), changes on other startup components or changes about HDD could be the examples.