Trusted Platform Module (TPM)

The Trusted Platform Module (TPM) Work Group has been chartered to create the TPM specification. The definition of the TPM architecture comes from the Technical Committee and the TPM Work Group defines the implementation of that architecture. A working knowledge of security in relation to the design and usage of cryptographic modules as well as cryptographic techniques including public-key cryptography, cryptographic algorithms and protocols is recommended.

A new research report on “Trusted Computing” published by Aberdeen Group, a Harte-Hanks Company (NYSE:HHS), reveals that organizations that have deployed applications based on trusted computing infrastructure exhibit superior capabilities in security governance, risk management and compliance compared to other respondents. The term “trusted computing” refers to applications that leverage hardware-based “roots of trust” at the edge of the network and at the endpoints – sometimes referred to as “hardware anchors in a sea of untrusted software” – for higher assurance.

TPMs are a basic building block used in most other specifications, for providing an anchor of trust. They can be used for validating basic boot properties before allowing network access (TNC), or for storing platform measurements (PC Client), or for providing self-measurement to provide anchors of trust to hypervisors (Virtualization).

David Challener

Johns Hopkins University Applied Physics Laboratory; Work Group Co-Chair

David Wooten

Partner Hardware Architect, Microsoft; Work Group Co-Chair


Resource NameResource TypeResource Tag
TPM Library SpecificationSpecificationTPM 2.0
Errata for TPM Library Specification 2.0SpecificationTPM 2.0,
TCG Algorithm RegistrySpecificationAlgorithms, TPM 2.0
TCG Physical Presence Interface SpecificationSpecificationPPI,
Physical Presence Interface,
Vendor ID RegistrySpecificationVendor ID
PC Client Protection Profile for TPM 2.0SpecificationCommon Criteria
TCG Architecture Overview, Version 1.4OverviewTrusted Computing Module
A Practical Guide to TPM 2.0BookReference,
Guide Book
Trusted Platform Module (TPM) SummaryOverviewTrusted Computing Module
Replacing Vulnerable Software with Secure HardwareOverviewTrusted Computing Module
Protect Your Data and Enhance SecurityOverviewTrusted Computing Module
Implementing Hardware Roots of TrustOverview, WebcastTrusted Computing Module
TPM Main SpecificationSpecificationTPM 1.2
TPM 1.2 Protection ProfileArchitect's GuideTPM 1.2, Common Criteria
CESG IA Top Tips - Trusted Platform ModulesOverviewTPM 1.2
BSSSD: Trusted Computing Now Available for FreeBSD and OpenBSDPress ReleaseFreeBSD,
OpenBSD, TPM 1.2
How to Use the TPM: A Guide to Hardware-Based Endpoint SecurityOverviewTPM 1.2
Resource Directory

Resource Directory

The Trusted Computing Group’s new search tool allows you to easily access our library of resources.


Join TCG

Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

About TCG

About TCG

Through open standards and specifications, Trusted Computing Group (TCG) enables secure computing.

Search Now
Learn More
Read More