Security Key Management Tool V.1.02 User's Manual

2022-08-23
●Introduction to Root of Trust
■Roots of trust are highly reliable hardware, firmware, and software components that perform specific, critical security functions. In an IoT system, a root of trust typically consists of identity and cryptographic keys rooted in the hardware of a device. It establishes a unique, immutable, and unclonable identity to authorize a device to exist in the IoT network.
■Secure boot is part of the services provided in the Root of Trust in many security systems. Authentication of the application uses Public Key Encryption. The associated keys are part of the Root of Trust of the system. Device Identity, which consists of Device Private Key and Device Certificate, is part of the Root of Trust for many IoT devices.
■From the above Root of Trust discussion, we can see that leakage of cryptographic keys can bring the secure system into a risky state. Protection of the Root of Trust involves limiting key accessibility to within the cryptographic boundary only, with keys that are securely stored and preferably unclonable. The Root of Trust should be locked from read and write access by unauthorized parties.
■The Renesas user key management system can provide all of the above desired protection.

Renesas

Security Key Management Tool

More

More

User's Guide

More

More

Please see the document for details

More

More

English Chinese Chinese and English Japanese

Jun.30.22

Rev.1.00

R20UT5154EJ0100

4.1 MB

- The full preview is over. If you want to read the whole 81 page document,please Sign in/Register -
  • +1 Like
  • Add to Favorites

Recommend

All reproduced articles on this site are for the purpose of conveying more information and clearly indicate the source. If media or individuals who do not want to be reproduced can contact us, which will be deleted.

Contact Us

Email: