History

  • 2003 - TPM 1.1b

  • 2005-2009 - TPM 1.2

    • Standard software interface

      • While keeping previous APIs

  • Mostly standard package pinout

  • Protection against dictionary attacks

  • More privacy-related features

  • Non-volatile RAM

  • Certified Migratable Keys (CMKs)

  • Ability to synchronize an internal timer with an external clock

From TPM 1.2 to 2.0

In 2000, the TCG chose the TPM hash algorithm.

  • Preferring SHA-1 over MD5.

  • TPM 1.2 relies a lot on SHA-1.

    • Which was first successfully attacked in 2005.

TPM 2.0 was conceived to allow alternative digest algorithms.

  • As well as alternatives to all cryptographic algorithms.

  • It also introduced symmetric cryptography.

    • For implementing hybrid cyphers.

Last updated