History
2003 - TPM 1.1b
2005-2009 - TPM 1.2
Standard software interface
While keeping previous APIs
Mostly standard package pinout
Protection against dictionary attacks
More privacy-related features
Non-volatile RAM
Certified Migratable Keys (CMKs)
Ability to synchronize an internal timer with an external clock
From TPM 1.2 to 2.0
In 2000, the TCG chose the TPM hash algorithm.
Preferring SHA-1 over MD5.
TPM 1.2 relies a lot on SHA-1.
Which was first successfully attacked in 2005.
TPM 2.0 was conceived to allow alternative digest algorithms.
As well as alternatives to all cryptographic algorithms.
It also introduced symmetric cryptography.
For implementing hybrid cyphers.
Last updated