Client Results >

Intrinsic ID

Enlisting Entropy to Generate Secure SoC Root Keys
December 7, 2021

Most methods of securing SOCs involve storing a root key that provides the basis of all derived keys and encryption of communication. The weakness with these methods is that even if the root key is stored in secure non-volatile memory, there are often methods to read the key. Once a key has been divulged the device can be cloned and its security is compromised. With long and complex supply chains there is a likelihood that physical devices may come within reach of attackers. With physical access, made easy through supply chains or remote deployment, such as is often the case with IoT devices, keys stored in eFuses, Flash EEPROM or even OTP NVM can be detected.

For full article

Search

Client Highlights

Union
Every company wants to be in the spotlight.
We deliver customized PR and communications programs that are intended to inspire our clients’ most important audiences. That audience may be you.
OUR SERVICES
WiredIsland Logo
Public Relations and Communications Strategy for Technology Companies
Charleston, USA - Paris, France

Copyright ©2024 | Wired Island PR. All Rights Reserved

Privacy Policy