NIST Definition



Roots of trust are highly reliable hardware, firmware, and software components 
that perform specific, critical security functions. 

Because roots of trust are inherently trusted, they must be secure by design. 

As such, many roots of trust are implemented in hardware so that malware cannot tamper with the functions

they provide. Roots of trust provide a firm foundation from which to build security and trust.

Roots of trust are highly reliable hardware, firmware, and software components that perform specific, critical security functions. 

Because roots of trust are inherently trusted, they must be secure by design. As such, many roots of trust are implemented in hardware so that malware cannot tamper with the functions they provide. Roots of trust provide a firm foundation from which to build security and trust.
Root of Trust SoC



The Root of Trust (RoT) is always a trusted starting point in cryptographic systems. Encryption encrypts and decrypts data, creates and verifies digital signatures, and so on. The most important thing to perform this function is the key, and a powerful hardware module is used to protect the key, and the most powerful hardware module is implemented by SoC. 

ICTK's Root of Trust has a function that generates a unique ID that cannot be physically duplicated with PUF, and an ECC that generates a certificate based on the unique ID in hardware. 
A key is generated internally, and the private key is encrypted once more using a H/W-based encryption algorithm in Secure Storage encrypted with an ID generated by PUF and then stored. It has a structure that cannot be leaked by nature. 
In addition, it protects the key required for encryption, and implements AES, RSA, and SHA for digital signature required for encryption/decryption in a single chip in hardware to provide hardware acceleration for encryption. 
With the spread of the Internet of Things (IoT), such a powerful RoT chip in hardware is very important. 
If a large number of IoT devices are hacked, they can attack the server with DDoS and provide contaminated information to the big data system. To avoid such hacking, RoT SoCs are at the start of forming a secure and reliable IoT ecosystem (Trusted IoT eco System).