Hardware Security Book Series 3: Anti-Tampering Designs in Hardware Security
Lead Author: Dr. Meng-Yi Wu, Dr. Kai-Hsin Chuang In a secure chip, the keys, which constitute the hardware root of trust (HRoT) of the chip, must be fully protected. An HRoT is the most important design in chip security, providing fundamental trust (root keys), hardware identification code (UID), hardware unique keys (HUK), and entropy. Consequently, […]
Why Hardware Root of Trust Needs Anti-Tampering Design
Foreword As the development of AIoT advanced in more diversified applications, such as artificial intelligence, image recognition, intelligent sensing, or smart healthcare, endpoint devices are exposed to more information security risks than ever. The technology boom also brings more security needs, so ensuring that devices are secure and trusted is critical. All layers of the […]