From the course: IoT Product Security
Unlock this course with a free trial
Join today to access over 23,100 courses taught by industry experts.
Hardware security
Hi, I'm Matthew Clark. And this is Lesson 4.11: Hardware Security Modules. In this lesson, we will introduce the hardware security modules and compare them with TPMs and TEEs. We'll identify common uses and we'll discuss secure boot and how it compares with measured boot. So let's get started. The underlying technology that enables an HSM was invented by Mohamed Atalla, an Egyptian engineer. He called his invention the Atalla box, and it could encrypt PIN and ATM messages and protect all flying devices with an unguessable PIN generating key. At the heart of his invention, lay the key block, which would allow for the secure interchange of symmetric keys or PINs between employees in the banking industry. The Atalla key block or AKB format, which enables this exchange, is the root of all cryptography used in the Payment Card Industry Data Security Standard, or PCI DSS, and the American National Standards Institute, or ANSI. So what is an HSM? Well, when it comes to IoT, many times we'll…
Contents
-
-
-
-
-
Foundations of trust: Part 110m 23s
-
(Locked)
Foundations of trust: Part 29m 6s
-
(Locked)
Foundations of trust: Part 39m 5s
-
(Locked)
Foundations of trust: Part 411m 29s
-
(Locked)
Encryption8m 39s
-
(Locked)
Trusted execution environment7m 57s
-
(Locked)
Trusted Platform Module: Part 17m 49s
-
(Locked)
Trusted Platform Module: Part 27m 53s
-
(Locked)
Trusted Platform Module: Part 39m 46s
-
(Locked)
Trusted Platform Module: Part 412m 50s
-
(Locked)
Hardware security9m 57s
-
(Locked)
DICE: Part 17m 45s
-
(Locked)
DICE: Part 29m 40s
-
(Locked)
Module 14 review10m 7s
-
-
-
-