Bottomley: Using Elliptic Curve Cryptography with TPM2
James Bottomley describesthe use of the trusted platform module with elliptic-curvecryptography, with a substantial digression into how the elliptic-curvealgorithm itself works."The initial attraction is the same as for RSA keys: making itimpossible to extract your private key from the system. However, themathematical calculations for EC keys are much simpler than for RSA keysand don't involve finding strong primes, so it's much simpler for the TPM(being a fairly weak calculation machine) to derive private and public ECkeys."