From the course: IoT Product Security
Unlock this course with a free trial
Join today to access over 23,100 courses taught by industry experts.
DICE: Part 2
Hi, I'm Matthew Clark. And this is Lesson 4.13: DICE, Part 2. In this lesson, we will continue to roll the DICE. We will talk about the device identity key pair, as well as the alias key pair, and the attestation process. So let's get started. To review, we've established how DICE generally works, creating a secret at one layer and passing it on to another layer. We've identified the role that the unique device secrets play, and we've discussed how to protect the UDS using a latch to prevent code and other layers from accessing it and erasing the UDS from memory. We've discussed how the CDI is created by taking the UDS and a measure of the first mutable code and passing it through a one-way function. Now, let's explore what happens in Layer 0. In Layer 0, DICE uses the first mutable code and the CDI to create the asymmetric key pair known as the device identity key pair. And this is an important distinction. The device identity key pair is not solely based on the unique device secret,…
Contents
-
-
-
-
-
Foundations of trust: Part 110m 23s
-
(Locked)
Foundations of trust: Part 29m 6s
-
(Locked)
Foundations of trust: Part 39m 5s
-
(Locked)
Foundations of trust: Part 411m 29s
-
(Locked)
Encryption8m 39s
-
(Locked)
Trusted execution environment7m 57s
-
(Locked)
Trusted Platform Module: Part 17m 49s
-
(Locked)
Trusted Platform Module: Part 27m 53s
-
(Locked)
Trusted Platform Module: Part 39m 46s
-
(Locked)
Trusted Platform Module: Part 412m 50s
-
(Locked)
Hardware security9m 57s
-
(Locked)
DICE: Part 17m 45s
-
(Locked)
DICE: Part 29m 40s
-
(Locked)
Module 14 review10m 7s
-
-
-
-