Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity
    • PC Hardware

    TPM Hardware Offers Easier Security

    Written by

    David Coursey
    Published August 11, 2005
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      The good news is that in less than five years—if we survive that long—we may be able to take PC security for granted. That isnt to say all the worlds data and networks will be completely locked down, just that we wont have to worry nearly so much as we do today.

      There will still be bad guys, of course, but they will have to work much harder and the reward for their criminal efforts may not be as great as it is today. A high level of security will be built into the systems and devices we use.

      A key development—which most users will see when they purchase a new PC with Windows Vista on it—is the Trusted Platform Module, a chip that promises to dramatically improve hardware and network security.

      If the module proves trustworthy, and there is every reason to believe it will, analysts expect it to become a standard component of PCs and other devices beginning, well, now.

      /zimages/2/28571.gifRead more here about why analysts think hardware-based Trusted Platform Modules are the wave of the future.

      The TPM, which can be included in processor chip sets or built on as a discrete device, stores encryption keys in whats been called an electronic, hardware-based lockbox. The reason this matters is because cryptographic information stored in software can never be completely secure.

      Back in 2000, nCipher, a company located in Cambridge, England, proved that software-based security could be cracked by looking for random numbers stored in main memory. Using the algorithm developed by nCipher, an intruder could take control of a PC with only software security and collect its private keys.

      With a TPM chip installed, cryptographic operations are handled in hardware, which offers a greater degree of protection. Is this perfect protection? What do you think? But TPM has been in development since 1999, when IBM pioneered the technique, and has wide industry support.

      TPM-equipped computers are already available from IBM, HP, Lenovo, and Dell. Gateway, Fujitsu-Siemens, and Toshiba have announced plans to join the TPM party as well.

      Current implementations are not common, however, at least in part due to poor user interfaces, the type only a corporate security boss could love (and users despise).

      Microsoft has built TPM support into Windows Vista and Intel is expected to implement the TPM standard in its chip sets.

      All this should come together on many users desktops when new Vista-compliant hardware is installed in 2006 and beyond. Vista, of course, includes a number of other security features, independent of TPM.

      /zimages/2/28571.gifClick here to read about Seagates hardware-encrypted notebook hard drive.

      By the time Vista ships in mid-to-late 2006, TPM proponents expect that the user interface issues will be solved and TPM will become a standard way to implement hardware security, used for authenticating hardware on a network or maintaining the keys for hard drives and other encrypted resources.

      What TPM wont do, however, is authenticate the user sitting at the keyboard. For that, I am expecting biometrics, especially fingerprints, to prevail. With a fingerprint reader, users could “prove” their identities to the computer for log-on. TPM would then authenticate the computer onto the network and provide access to encrypted key chains and hard drives.

      With the proper software, this could be made transparent to users. Fingerprint authentication would actually be simpler than what users do today: remember or write down passwords.

      With TPM, it would be easy for users to create different passwords for every service or site that requested one, all accessible with a single fingerprint and automatically dispensed as required.

      Each of these passwords could be strong and individual. This would prevent criminals from discovering the single, often weak, password that opens all a users accounts.

      Analyst firm IDC predicts that TPM adoption for both business and consumer PC hardware will ramp up to near ubiquity by 2010. TPM technology is also being developed for other platforms, including servers and wireless devices, and, if successful on desktops, might find wide adoption on these platforms as well.

      So thats the good news. The bad news, of course, is that we have to get from today to five years from now. But since TPM can be expected to ramp up starting fairly soon, perhaps the road ahead will be less bumpy—and more secure—than the one weve traveled so far.

      /zimages/2/28571.gifCheck out eWEEK.coms for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzers Weblog.

      David Coursey
      David Coursey
      One of technology's most recognized bylines, David Coursey is Special Correspondent for eWeek.com, where he writes a daily Blog (blog.ziffdavis.com/coursey) and twice-weekly column. He is also Editor/Publisher of the Technology Insights newsletter and President of DCC, Inc., a professional services and consulting firm.Former Executive Editor of ZDNet AnchorDesk, Coursey has also been Executive Producer of a number of industry conferences, including DEMO, Showcase, and Digital Living Room. Coursey's columns have been quoted by both Bill Gates and Steve Jobs and he has appeared on ABC News Nightline, CNN, CBS News, and other broadcasts as an expert on computing and the Internet. He has also written for InfoWorld, USA Today, PC World, Computerworld, and a number of other publications. His Web site is www.coursey.com.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.