Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • PC Hardware

    TPM Hardware Offers Easier Security

    By
    David Coursey
    -
    August 11, 2005
    Share
    Facebook
    Twitter
    Linkedin

      The good news is that in less than five years—if we survive that long—we may be able to take PC security for granted. That isnt to say all the worlds data and networks will be completely locked down, just that we wont have to worry nearly so much as we do today.

      There will still be bad guys, of course, but they will have to work much harder and the reward for their criminal efforts may not be as great as it is today. A high level of security will be built into the systems and devices we use.

      A key development—which most users will see when they purchase a new PC with Windows Vista on it—is the Trusted Platform Module, a chip that promises to dramatically improve hardware and network security.

      If the module proves trustworthy, and there is every reason to believe it will, analysts expect it to become a standard component of PCs and other devices beginning, well, now.

      /zimages/2/28571.gifRead more here about why analysts think hardware-based Trusted Platform Modules are the wave of the future.

      The TPM, which can be included in processor chip sets or built on as a discrete device, stores encryption keys in whats been called an electronic, hardware-based lockbox. The reason this matters is because cryptographic information stored in software can never be completely secure.

      Back in 2000, nCipher, a company located in Cambridge, England, proved that software-based security could be cracked by looking for random numbers stored in main memory. Using the algorithm developed by nCipher, an intruder could take control of a PC with only software security and collect its private keys.

      With a TPM chip installed, cryptographic operations are handled in hardware, which offers a greater degree of protection. Is this perfect protection? What do you think? But TPM has been in development since 1999, when IBM pioneered the technique, and has wide industry support.

      TPM-equipped computers are already available from IBM, HP, Lenovo, and Dell. Gateway, Fujitsu-Siemens, and Toshiba have announced plans to join the TPM party as well.

      Current implementations are not common, however, at least in part due to poor user interfaces, the type only a corporate security boss could love (and users despise).

      Microsoft has built TPM support into Windows Vista and Intel is expected to implement the TPM standard in its chip sets.

      All this should come together on many users desktops when new Vista-compliant hardware is installed in 2006 and beyond. Vista, of course, includes a number of other security features, independent of TPM.

      /zimages/2/28571.gifClick here to read about Seagates hardware-encrypted notebook hard drive.

      By the time Vista ships in mid-to-late 2006, TPM proponents expect that the user interface issues will be solved and TPM will become a standard way to implement hardware security, used for authenticating hardware on a network or maintaining the keys for hard drives and other encrypted resources.

      What TPM wont do, however, is authenticate the user sitting at the keyboard. For that, I am expecting biometrics, especially fingerprints, to prevail. With a fingerprint reader, users could “prove” their identities to the computer for log-on. TPM would then authenticate the computer onto the network and provide access to encrypted key chains and hard drives.

      With the proper software, this could be made transparent to users. Fingerprint authentication would actually be simpler than what users do today: remember or write down passwords.

      With TPM, it would be easy for users to create different passwords for every service or site that requested one, all accessible with a single fingerprint and automatically dispensed as required.

      Each of these passwords could be strong and individual. This would prevent criminals from discovering the single, often weak, password that opens all a users accounts.

      Analyst firm IDC predicts that TPM adoption for both business and consumer PC hardware will ramp up to near ubiquity by 2010. TPM technology is also being developed for other platforms, including servers and wireless devices, and, if successful on desktops, might find wide adoption on these platforms as well.

      So thats the good news. The bad news, of course, is that we have to get from today to five years from now. But since TPM can be expected to ramp up starting fairly soon, perhaps the road ahead will be less bumpy—and more secure—than the one weve traveled so far.

      /zimages/2/28571.gifCheck out eWEEK.coms for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzers Weblog.

      David Coursey
      One of technology's most recognized bylines, David Coursey is Special Correspondent for eWeek.com, where he writes a daily Blog (blog.ziffdavis.com/coursey) and twice-weekly column. He is also Editor/Publisher of the Technology Insights newsletter and President of DCC, Inc., a professional services and consulting firm.Former Executive Editor of ZDNet AnchorDesk, Coursey has also been Executive Producer of a number of industry conferences, including DEMO, Showcase, and Digital Living Room. Coursey's columns have been quoted by both Bill Gates and Steve Jobs and he has appeared on ABC News Nightline, CNN, CBS News, and other broadcasts as an expert on computing and the Internet. He has also written for InfoWorld, USA Today, PC World, Computerworld, and a number of other publications. His Web site is www.coursey.com.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×