Skip to main content

INDUSTRY

The Root of Trust: A Foundation for Trusted Computing

A hardware Root of Trust is foundational to any embedded defense application, as it provides protections against physical attack and encrypts critical data at rest.

Download PDF

A hardware Root of Trust is foundational to any embedded defense application, as it provides protections against physical attack, encrypts critical data at rest, and ensures that a corrupted BIOS will not damage a system. These capabilities are enabled by trusted functions that are stored in hardware, and therefore can’t be changed.

Engineers building Intel® processor-based systems need look no further than Intel® Trusted Execution Technology (Intel® TXT) and Boot Guard to implement a Root of Trust in their next design.

In this white paper, aerospace and defense engineers will learn:

  • The basics of a Root of Trust
  • How Intel® TXT and Boot Guard help establish a Root of Trust in embedded systems
  • About off-the-shelf processor modules with these security features designed in