I am not going to step onto Hal's toes on the fabulous job he is
doing explaining the TPM and its capabilities, Hardeep.

But, wrt your specific statement I've excerpted below, I would
encourage you to read this excellent introduction to public-key
cryptography at:

http://docs.sun.com/source/816-6154-10/index.html

Originally created by people at (the now defunct) Netscape, the
short paper explains many concepts that the TPM implements and uses.
It will help clear some of the confusion you have about which keys
are used for what purpose (signing vs. decryption).

Arshad Noor
StrongAuth, Inc.

Hardeep Uppal wrote:
> if 
> a trusted node generated a public/private key pair and sends the public 
> key to a new node which is trying to verify its state, then can the new 
> node store that public key inside its tpm and use it to sign the pcr 
> values.

------------------------------------------------------------------------------
Let Crystal Reports handle the reporting - Free Crystal Reports 2008 30-Day 
trial. Simplify your report design, integration and deployment - and focus on 
what you do best, core application coding. Discover what's new with
Crystal Reports now.  http://p.sf.net/sfu/bobj-july
_______________________________________________
TrouSerS-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/trousers-users

Reply via email to