The Root of Trust: A Foundation for Trusted Computing

January 31, 2018

A hardware Root of Trust is foundational to any embedded defense application, as it provides protections against physical attack, encrypts critical data at rest, and ensures that a corrupted BIOS will not damage a system. These capabilities are enabled by trusted functions that are stored in hardware, and therefore can’t be changed.

Engineers building Intel® processor-based systems need look no further than Intel® Trusted Execution Technology (Intel® TXT) and Boot Guard to implement a Root of Trust in their next design.

In this white paper, aerospace and defense engineers will learn:

  • The basics of a Root of Trust
  • How Intel® TXT and Boot Guard help establish a Root of Trust in embedded systems
  • About off-the-shelf processor modules with these security features designed in
Previous Download
Picture Perfect: Facilitating Higher Resilience for Machine Vision Cameras
Picture Perfect: Facilitating Higher Resilience for Machine Vision Cameras

Next White Paper
Intel® Xeon® D: A Significant Leap Forward in General Purpose Processor (GPP) Technology Across the Spectrum of Defense Applications
Intel® Xeon® D: A Significant Leap Forward in General Purpose Processor (GPP) Technology Across the Spectrum of Defense Applications

×

First Name
Last Name
Your Company
Phone Number
Country/Region
Subscribe To Intel Updates
Subscribe To Alliance Partner Updates
By submitting a form on this site, you are confirming you are an adult 18 years or older and you agree to Intel and Intel® IoT Solutions Alliance members contacting you with marketing-related emails or by telephone. You may unsubscribe at any time. Intel's web sites and communications are subject to our Privacy Notice and Terms of Use.
I would like to be contacted by: - optional
Your contact request is submitted.
Error - something went wrong!