From the course: IoT Product Security

Unlock this course with a free trial

Join today to access over 23,100 courses taught by industry experts.

DICE: Part 2

DICE: Part 2

Hi, I'm Matthew Clark. And this is Lesson 4.13: DICE, Part 2. In this lesson, we will continue to roll the DICE. We will talk about the device identity key pair, as well as the alias key pair, and the attestation process. So let's get started. To review, we've established how DICE generally works, creating a secret at one layer and passing it on to another layer. We've identified the role that the unique device secrets play, and we've discussed how to protect the UDS using a latch to prevent code and other layers from accessing it and erasing the UDS from memory. We've discussed how the CDI is created by taking the UDS and a measure of the first mutable code and passing it through a one-way function. Now, let's explore what happens in Layer 0. In Layer 0, DICE uses the first mutable code and the CDI to create the asymmetric key pair known as the device identity key pair. And this is an important distinction. The device identity key pair is not solely based on the unique device secret,…

Contents