Abstract
Trust in any system needs a foundation or a root of trust. Here, we discuss the roots of trust that have been proposed or deployed. Typically, the root of trust is based on the secrecy of a private key that is embedded in hardware; the corresponding public key is certified by the hardware’s manufacturer. As we discuss, some systems further rely on a piece of code that must execute in the early boot process for their root of trust.We also discuss schemes where the root of trust is established by the properties of the physical hardware itself.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2011 The Author(s)
About this chapter
Cite this chapter
Parno, B., McCune, J.M., Perrig, A. (2011). Roots of Trust. In: Bootstrapping Trust in Modern Computers. SpringerBriefs in Computer Science, vol 10. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-1460-5_6
Download citation
DOI: https://doi.org/10.1007/978-1-4614-1460-5_6
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-1459-9
Online ISBN: 978-1-4614-1460-5
eBook Packages: Computer ScienceComputer Science (R0)