As used herein and in the claims, references to using a TP to perform a particular cryptographic calculation, authentication, or other function may include the use of the TPM chip and/or other software or hardware components which comprise the TP such as a nexus or NCA.