I am not going to step onto Hal's toes on the fabulous job he is doing explaining the TPM and its capabilities, Hardeep.
But, wrt your specific statement I've excerpted below, I would encourage you to read this excellent introduction to public-key cryptography at: http://docs.sun.com/source/816-6154-10/index.html Originally created by people at (the now defunct) Netscape, the short paper explains many concepts that the TPM implements and uses. It will help clear some of the confusion you have about which keys are used for what purpose (signing vs. decryption). Arshad Noor StrongAuth, Inc. Hardeep Uppal wrote: > if > a trusted node generated a public/private key pair and sends the public > key to a new node which is trying to verify its state, then can the new > node store that public key inside its tpm and use it to sign the pcr > values. ------------------------------------------------------------------------------ Let Crystal Reports handle the reporting - Free Crystal Reports 2008 30-Day trial. Simplify your report design, integration and deployment - and focus on what you do best, core application coding. Discover what's new with Crystal Reports now. http://p.sf.net/sfu/bobj-july _______________________________________________ TrouSerS-users mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/trousers-users
