Article 353TS Bottomley: Using Elliptic Curve Cryptography with TPM2

Bottomley: Using Elliptic Curve Cryptography with TPM2

by
corbet
from LWN.net on (#353TS)
James Bottomley describesthe use of the trusted platform module with elliptic-curvecryptography, with a substantial digression into how the elliptic-curvealgorithm itself works."The initial attraction is the same as for RSA keys: making itimpossible to extract your private key from the system. However, themathematical calculations for EC keys are much simpler than for RSA keysand don't involve finding strong primes, so it's much simpler for the TPM(being a fairly weak calculation machine) to derive private and public ECkeys."

External Content
Source RSS or Atom Feed
Feed Location http://lwn.net/headlines/rss
Feed Title LWN.net
Feed Link https://lwn.net/
Reply 0 comments