Crypto Shield Hookup Guide

This Tutorial is Retired!

This tutorial covers concepts or technologies that are no longer current. It's still here for you to read and enjoy, but may not be as useful as our newest tutorials.

Pages
Contributors: jbdatko, CaseyTheRobot
Favorited Favorite 0

Resources and Going Further

If you are using the TPM on a Linux board, then Chapter 4 of BeagleBone for Secret Agents should mostly apply. It shows how to add a keypad and combine it with the TPM to protect GPG keys.

Josh is usually lurking on the #cryptotronix channel on Freenode, so you can catch him there. While you are joining IRC channels, hang out in the SparkFun IRC channel as well!

Further reading:

  • Cryptography: A Very Short Introduction. For $11, this is the best introduction to Cryptography that I've read. If you are looking to learn more about the topic, start here.
  • Cryptography Engineering. If you already have the background, then I'd check this book out next. It is more detailed, but the authors explain the concepts well. It also contains suggested exercises if you like doing homework.