Gold49er, excellent summary. The ACS Website artic
Post# of 82672
KTLS™ (Keystroke Transport Layer Security) protocol is currently
integrated in to Intel’s TPM for
enterprise endpoint desktop
deployments. If Intel (or other)
TPM is available for mobile
devices KTLS™ protocol can be
deployed.
The Key management is the management of cryptographic keys. KTLS™ uses the AES algorithm with a key size of 256 bits to encrypt keystrokes. AES is a symmetric encryption scheme. The same key is used to encrypt and decrypt.
The Session key is generated once per session (KTLS™ loaded/unloaded). It
can be generated either by a TPM chip (if it is there), or else by a built-in Random Number Generator.
If a TPM chip is available for access to the KTLS™ system components, the Session Key is encrypted/decrypted by a TPM Master Key Pair (RSA 2048 public key cryptosystem), which resides on the TPM chip (and never leaves it).
The encrypted Session Key is stored in secure memory shared by all KTLS™
system components. The TPM Master Key Pair is generated by the TPM chip
every time the computer is powered up. This can be accessed via the NULL
hierarchy.
If a TPM chip is not available for access to the KTLS™ system components, the Session Key is encrypted/decrypted by a Storage Master Key (AES 256 Key) comprised of a combination of a hard coded part and a randomly generated part.