From the course: IoT Product Security
Unlock this course with a free trial
Join today to access over 23,100 courses taught by industry experts.
DICE: Part 1
Hi, I'm Matthew Clark. And this is Lesson 4.12: DICE, Part 1. In this lesson, we will introduce DICE, the device identifier composition engine, what it's used for. We'll discover the unique device secret, and identify the DICE process. We're going to use some reference material by the Trusted Computing Group to guide us with some additional help from others. I like to call out one of those authors. Sarah Pelosi wrote an excellent article in electronicproducts.com called "How the DICE Standard Delivers Strong Security for IoT Devices." I'll put a link to it in the resource section and I hope you take time to read it. As always, I encourage you to continue your education on these topics outside of what I've prepared. The references sections of this course is a great place to start, and I've listed other authors that I've used, so let's get started. The Trusted Computing Group created the device identifier, composition engine or DICE. It provides hardware-based device identity and device…
Contents
-
-
-
-
-
Foundations of trust: Part 110m 23s
-
(Locked)
Foundations of trust: Part 29m 6s
-
(Locked)
Foundations of trust: Part 39m 5s
-
(Locked)
Foundations of trust: Part 411m 29s
-
(Locked)
Encryption8m 39s
-
(Locked)
Trusted execution environment7m 57s
-
(Locked)
Trusted Platform Module: Part 17m 49s
-
(Locked)
Trusted Platform Module: Part 27m 53s
-
(Locked)
Trusted Platform Module: Part 39m 46s
-
(Locked)
Trusted Platform Module: Part 412m 50s
-
(Locked)
Hardware security9m 57s
-
(Locked)
DICE: Part 17m 45s
-
(Locked)
DICE: Part 29m 40s
-
(Locked)
Module 14 review10m 7s
-
-
-
-