{"id":2638,"date":"2022-04-18T08:07:18","date_gmt":"2022-04-18T08:07:18","guid":{"rendered":"https:\/\/www.pufsecurity.com\/?post_type=dlp_document&p=2638"},"modified":"2025-01-14T02:10:01","modified_gmt":"2025-01-14T02:10:01","slug":"why-hardware-root-of-trust-needs-anti-tampering-design","status":"publish","type":"dlp_document","link":"https:\/\/www.pufsecurity.com\/zh-hans\/document\/why-hardware-root-of-trust-needs-anti-tampering-design\/","title":{"rendered":"Why Hardware Root of Trust\u00a0 Needs Anti-Tampering Design"},"content":{"rendered":"\n
Foreword<\/strong><\/p>\n\n\n\n
As the development of AIoT advanced in more diversified applications, such as artificial intelligence, image recognition, intelligent sensing, or smart healthcare, endpoint devices are exposed to more information security risks than ever. The technology boom also brings more security needs, so ensuring that devices are secure and trusted is critical. All layers of the system need corresponding security designs, from the application, operating system, and firmware to the hardware, to ensure the entire system\u2019s security level. The most important design in the overall security network is the root of trust in the hardware layer, which is the foundation of trust in the entire chip.<\/p>\n\n\n\n
The hardware root of trust (HRoT) provides the trust base (root key), hardware identifier (UID), hardware unique key (HUK), and entropy required for the secure operation of the entire chip and therefore is often the focus of hacker attacks. If the design can\u2019t effectively resist attacks, hackers can easily obtain the secrets of the entire chip. Attackers can use the secrets to crack identity authentication and data encryption and steal product design know-how, causing application security problems.<\/p>\n\n\n\n
\u2193\u2193\u2193 7-minute video for a quick digest of this article (English voice-over + Chinese subtitles)\u2193\u2193\u2193<\/p>\n\n\n\n