- Tech know how online

root of trust (RoT)

The Roots of Trust (RoT) form the roots of trust in trusted computing. The Roots of Trust provide the functions that the operating system trusts. They form the cryptographic processor technology for the Trusted Platform Module (TPM) embedded on the personal computer

or mobile computers. Root of Trust functions include immediate encryption of drives, detection of unauthorized access and tampering with the operating system, programs and data, detection of rootkits, securing stored data to prevent changes to the data set, and digital rights management

. In addition to the software-dependent Roots of Trust, there is also the hardware trust.

The protection hardware root of trust provides a trusted execution environment (TEE) and supports one or more cryptographic functions. It also has a simple user interface that the host can interact with. In addition to the trusted functions mentioned above, a root of trust must have a secure central processing unit (CPU) on which the secure software runs. When software runs on the CPU, the runtime data must be protected. This may contain secret keys and other sensitive data.

Informationen zum Artikel
Englisch: root of trust - RoT
Updated at: 24.07.2020
#Words: 171
Translations: DE