Talk:Cold boot attack
Appearance
Cryptography: Computer science Unassessed | |||||||||||||
|
I think there should be a criticisms section. I know a lot of debate has been going on about this in the crypto community. Especially the TrueCrypt forums.
False information?
Coreect me if I'm wrong - but doesn't TPM use hardware? However, this article claims that this is a problem with hardware, therefore TPM is weak. Does this imply that TPM is not hardware? It seems to me that this is inaccurate information. —CobraA1 05:08, 19 March 2008 (UTC)
- No, the hardware that the problem is with is the memory, not the TPM. Socrates2008 (Talk) 06:02, 19 March 2008 (UTC)
- Forgive me for being dense - but if the key is stored on the TPM rather than in memory, then how do they find the key? —CobraA1 20:55, 19 March 2008 (UTC)
- Unfortunately, you've got to retrieve the key from the TPM at some point and use it. (Decryption/encryption occurs in memory) Socrates2008 (Talk) 21:04, 19 March 2008 (UTC)
- Okay, thanks for the clarification. —CobraA1 21:25, 19 March 2008 (UTC)
- Unfortunately, you've got to retrieve the key from the TPM at some point and use it. (Decryption/encryption occurs in memory) Socrates2008 (Talk) 21:04, 19 March 2008 (UTC)
- Forgive me for being dense - but if the key is stored on the TPM rather than in memory, then how do they find the key? —CobraA1 20:55, 19 March 2008 (UTC)