The Trusted Platform Module (TPM) makes extensive use of asymmetric key pairs, often called "public-private key pairs." The private key is kept secret, and the corresponding public key can be widely distributed.

Topics in this section discuss some of the most important keys used by the TPM security hardware, and also discuss the owner password. This section includes the following topics: