As security has become a must-have in most systems, hardware roots of trust (HRoTs) have started appearing in many chips. Critical to an HRoT is the ability to authenticate and to create keys – ideally from a reliable source that is unviewable and immutable.
“We see hardware roots of trust deployed in two use models — providing a foundation to securely start a system, and enabling a se...
» read more