From the course: IoT Product Security
Unlock this course with a free trial
Join today to access over 23,100 courses taught by industry experts.
Foundations of trust: Part 3
From the course: IoT Product Security
Foundations of trust: Part 3
Hi, I'm Matthew Clark. And this is Lesson 4.3: Foundations of Trust, Part 3. In this lesson, we'll look at hardware-based root of trust, including external chips, integrated chips, the bus architecture, and extended security services. Then we're going to look at different levels of security that can be added to integrated chips. So let's get started. Let's begin our discussion by examining a silicon-based hardware root of trust. There are really two categories of processors that we'll discuss. The first category are fixed function processors, and these are more like state machines. They're small, simple devices meant to perform very limited functions very, very well. And they can provide cryptographic services such as encryption and decryption and key management. But it's going to do a certain thing a certain way, and that's just what it does. The second category are programmable processors. This is the category that we'll spend most of our time discussing in these lessons. These…
Contents
-
-
-
-
-
Foundations of trust: Part 110m 23s
-
(Locked)
Foundations of trust: Part 29m 6s
-
(Locked)
Foundations of trust: Part 39m 5s
-
(Locked)
Foundations of trust: Part 411m 29s
-
(Locked)
Encryption8m 39s
-
(Locked)
Trusted execution environment7m 57s
-
(Locked)
Trusted Platform Module: Part 17m 49s
-
(Locked)
Trusted Platform Module: Part 27m 53s
-
(Locked)
Trusted Platform Module: Part 39m 46s
-
(Locked)
Trusted Platform Module: Part 412m 50s
-
(Locked)
Hardware security9m 57s
-
(Locked)
DICE: Part 17m 45s
-
(Locked)
DICE: Part 29m 40s
-
(Locked)
Module 14 review10m 7s
-
-
-
-