What is a TPM, and Why Does Windows Need One For Disk Encryption? (2024)

Quick Links

  • What Is It, Exactly?

  • Encryption, Encryption, Encryption

  • Why TrueCrypt Shunned TPMs

BitLocker disk encryption normally requires a TPM on Windows. Microsoft's EFS encryption can never use a TPM. The new "device encryption" feature on Windows 10 and 8.1 also requires a modern TPM, which is why it's only enabled onnew hardware. But what is a TPM?

TPM stands for "Trusted Platform Module". It's a chip on your computer's motherboard that helps enable tamper-resistant full-disk encryption without requiring extremely long passphrases.

What Is It, Exactly?

Related: How to Set Up BitLocker Encryption on Windows

The TPM is a chip that's part of your computer's motherboard -- if you bought an off-the-shelf PC, it's soldered onto the motherboard. If you built your own computer, you can buy one as an add-on moduleif your motherboard supports it. The TPM generates encryption keys, keeping part of the key to itself. So, if you're using BitLocker encryption or device encryption on a computer with the TPM, part of the key is stored in the TPM itself, rather than just on the disk. This means an attacker can't just remove the drive from the computer and attempt to access its files elsewhere.

This chip provides hardware-based authenticationand tamper detection, so an attacker can't attempt to remove the chip and place it on another motherboard, or tamper with the motherboard itself to attempt to bypass the encryption -- at least in theory.

Encryption, Encryption, Encryption

For most people, the most relevant use case here will be encryption. Modern versions of Windows use the TPM transparently. Just sign in with a Microsoft account on a modern PC that ships with "device encryption" enabled and it'll use encryption. Enable BitLocker disk encryption and Windows will use a TPM to store the encryption key.

You normally just gain access to an encrypted drive by typing your Windows login password, but it's protected with a longer encryption key than that. That encryption key is partially stored in the TPM, so you actually need your Windows login password and the same computer the drive is from to get access. That's why the "recovery key" for BitLocker is quite a bit longer -- you need that longer recovery key to access your data if you move the drive to another computer.

This is one reason why the older Windows EFS encryption technology isn't as good. It has no way to store encryption keys in a TPM. That means it has to store its encryption keys on the hard drive, and makes it much less secure. BitLocker can function on drives without TPMs, but Microsoft went out of its way to hide this option to emphasize how important a TPM is for security.

What is a TPM, and Why Does Windows Need One For Disk Encryption? (1)

Why TrueCrypt Shunned TPMs

Related: 3 Alternatives to the Now-Defunct TrueCrypt for Your Encryption Needs

Of course, a TPM isn't the only workable option for disk encryption. TrueCrypt's FAQ -- now taken down -- used to stress why TrueCrypt didn't use and would never use a TPM. It slammed TPM-based solutions as providing a false sense of security. Of course, TrueCrypt's website now states that TrueCrypt itself is vulnerable and recommends you use BitLocker -- which uses TPMs -- instead. Soit's a bit of a confusing mess in TrueCrypt land.

This argumentis still available on VeraCrypt's website, however.VeraCrypt is an active fork of TrueCrypt. VeraCrypt's FAQ insists BitLocker and other utilities that rely on TPM use it to prevent against attacks that require an attacker to have administrator access, or have physical access to a computer. "The only thing that TPM is almost guaranteed to provide is a false sense of security," says the FAQ. It says that a TPM is, at best, "redundant".

There's a bit of truth to this. No security is completely absolute. A TPM is arguably more of a convenience feature. Storing the encryption keys in hardware allows a computer to automatically decrypt the drive, or decrypt it with a simple password. It's more secure than simply storing thatkey on the disk, as an attacker can't simply remove the disk and insert it into another computer. It's tied to that specific hardware.

Ultimately, a TPM isn't something you have to think about much. Your computer either has a TPM or it doesn't -- and modern computers generally will. Encryption tools like Microsoft's BitLocker and "device encryption" automatically use a TPM to transparently encrypt your files. That's better than not using any encryption at all, and it's better than simply storing the encryption keys on the disk, as Microsoft's EFS (Encrypting File System) does.

As far as TPM vs. non-TPM-based solutions, or BitLocker vs. TrueCrypt and similar solutions -- well, that's a complicated topic we aren't really qualified to address here.

Image Credit: Paolo Attivissimo on Flickr

What is a TPM, and Why Does Windows Need One For Disk Encryption? (2024)
Top Articles
A detailed look at some of my passive income streams - Rachel Rofé
A Beginner’s Guide to Trading – Forex Academy
Dragon Age Inquisition War Table Operations and Missions Guide
Food King El Paso Ads
Belle Meade Barbershop | Uncle Classic Barbershop | Nashville Barbers
Polyhaven Hdri
Wild Smile Stapleton
Free Robux Without Downloading Apps
Whiskeytown Camera
World of White Sturgeon Caviar: Origins, Taste & Culinary Uses
Thayer Rasmussen Cause Of Death
Cvs Learnet Modules
Athens Bucket List: 20 Best Things to Do in Athens, Greece
8 Ways to Make a Friend Feel Special on Valentine's Day
10 Best Places to Go and Things to Know for a Trip to the Hickory M...
The Largest Banks - ​​How to Transfer Money With Only Card Number and CVV (2024)
Video shows two planes collide while taxiing at airport | CNN
Pay Boot Barn Credit Card
Van Buren County Arrests.org
Wnem Tv5 Obituaries
Renfield Showtimes Near Paragon Theaters - Coral Square
Access a Shared Resource | Computing for Arts + Sciences
What we lost when Craigslist shut down its personals section
A Man Called Otto Showtimes Near Carolina Mall Cinema
Publix Christmas Dinner 2022
Possum Exam Fallout 76
Primerica Shareholder Account
Productos para el Cuidado del Cabello Después de un Alisado: Tips y Consejos
Syracuse Jr High Home Page
Otis Offender Michigan
Word Trip Level 359
Scioto Post News
Haley Gifts :: Stardew Valley
One Credit Songs On Touchtunes 2022
Appraisalport Com Dashboard /# Orders
Devin Mansen Obituary
Foolproof Module 6 Test Answers
Laff Tv Passport
Trap Candy Strain Leafly
Lake Andes Buy Sell Trade
All Obituaries | Sneath Strilchuk Funeral Services | Funeral Home Roblin Dauphin Ste Rose McCreary MB
Sun Tracker Pontoon Wiring Diagram
The Conners Season 5 Wiki
3 Zodiac Signs Whose Wishes Come True After The Pisces Moon On September 16
Tricare Dermatologists Near Me
Mychart University Of Iowa Hospital
Chubbs Canton Il
R/Gnv
Acuity Eye Group - La Quinta Photos
Greg Steube Height
How to Find Mugshots: 11 Steps (with Pictures) - wikiHow
Https://Eaxcis.allstate.com
Latest Posts
Article information

Author: Prof. An Powlowski

Last Updated:

Views: 5375

Rating: 4.3 / 5 (64 voted)

Reviews: 95% of readers found this page helpful

Author information

Name: Prof. An Powlowski

Birthday: 1992-09-29

Address: Apt. 994 8891 Orval Hill, Brittnyburgh, AZ 41023-0398

Phone: +26417467956738

Job: District Marketing Strategist

Hobby: Embroidery, Bodybuilding, Motor sports, Amateur radio, Wood carving, Whittling, Air sports

Introduction: My name is Prof. An Powlowski, I am a charming, helpful, attractive, good, graceful, thoughtful, vast person who loves writing and wants to share my knowledge and understanding with you.