From the course: IoT Product Security

Unlock this course with a free trial

Join today to access over 23,100 courses taught by industry experts.

Foundations of trust: Part 3

Foundations of trust: Part 3

From the course: IoT Product Security

Foundations of trust: Part 3

Hi, I'm Matthew Clark. And this is Lesson 4.3: Foundations of Trust, Part 3. In this lesson, we'll look at hardware-based root of trust, including external chips, integrated chips, the bus architecture, and extended security services. Then we're going to look at different levels of security that can be added to integrated chips. So let's get started. Let's begin our discussion by examining a silicon-based hardware root of trust. There are really two categories of processors that we'll discuss. The first category are fixed function processors, and these are more like state machines. They're small, simple devices meant to perform very limited functions very, very well. And they can provide cryptographic services such as encryption and decryption and key management. But it's going to do a certain thing a certain way, and that's just what it does. The second category are programmable processors. This is the category that we'll spend most of our time discussing in these lessons. These…

Contents