Because roots of trust are inherently trusted, they must be secure by design.
As such, many roots of trust are implemented in hardware so that malware cannot tamper with the functions
they provide. Roots of trust provide a firm foundation from which to build security and trust.
ICTK's Root of Trust has a function that generates a unique ID that cannot be physically duplicated with PUF, and an ECC that generates a certificate based on the unique ID in hardware. A key is generated internally, and the private key is encrypted once more using a H/W-based encryption algorithm in Secure Storage encrypted with an ID generated by PUF and then stored. It has a structure that cannot be leaked by nature. In addition, it protects the key required for encryption, and implements AES, RSA, and SHA for digital signature required for encryption/decryption in a single chip in hardware to provide hardware acceleration for encryption. With the spread of the Internet of Things (IoT), such a powerful RoT chip in hardware is very important. If a large number of IoT devices are hacked, they can attack the server with DDoS and provide contaminated information to the big data system. To avoid such hacking, RoT SoCs are at the start of forming a secure and reliable IoT ecosystem (Trusted IoT eco System).
What is Hardware Root of Trust (HRoT)?