Mastering IoT Security: The Essential Role of Root of Trust 🔐

Discover how the Root of Trust—comprising device identity and cryptographic keys—is crucial for building a secure and reliable IoT network. Learn the fundamentals and best practices to protect your IoT infrastructure.

Mastering IoT Security: The Essential Role of Root of Trust 🔐
Crypto Quantique
1.4K views • Jul 29, 2021
Mastering IoT Security: The Essential Role of Root of Trust 🔐

About this video

The Root-of-Trust, a combination of unique device identity and cryptographic keys, is a vital element for delivering a secure IoT network. This video compares the merits of three approaches to creating a secure Root-of-Trust: key injection, first generation SRAM physical unclonable functions (PUFs), and second generation, quantum-driven technology.

Company information:
Crypto Quantique has created the world’s most secure end-to-end IoT security platform. At its heart is the world’s first quantum-driven semiconductor hardware IP, called QDID, that generates multiple, unique, unforgeable cryptographic keys for devices manufactured using standard CMOS processes. The keys do not need to be stored and can be used independently by multiple applications on demand. When combined with cryptographic APIs from the company’s universal IoT security platform, QuarkLink, the solution creates a secure bridge between silicon, device, software, and solutions provider.

Learn more at https://www.cryptoquantique.com/

The company, which is based in London, UK, was co-founded by Dr Shahram Mossayebi (CEO), an expert in cryptosystems, and Dr Patrick Camilleri (VP Research & Innovation), a semiconductor designer with significant experience in complex parallel computer systems.

Video Information

Views

1.4K

Likes

22

Duration

15:38

Published

Jul 29, 2021

User Reviews

4.5
(1)
Rate:

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.