The Root of Trust: A Foundation for Trusted Computing
A hardware Root of Trust is foundational to any embedded defense application, as it provides protections against physical attack and encrypts critical data at rest.
A hardware Root of Trust is foundational to any embedded defense application, as it provides protections against physical attack, encrypts critical data at rest, and ensures that a corrupted BIOS will not damage a system. These capabilities are enabled by trusted functions that are stored in hardware, and therefore can’t be changed.
Engineers building Intel® processor-based systems need look no further than Intel® Trusted Execution Technology (Intel® TXT) and Boot Guard to implement a Root of Trust in their next design.
In this white paper, aerospace and defense engineers will learn:
- The basics of a Root of Trust
- How Intel® TXT and Boot Guard help establish a Root of Trust in embedded systems
- About off-the-shelf processor modules with these security features designed in