Source that can always be trusted within a cryptographic system. A root of trust scheme often includes a hardware module. A hardware root of trust typically includes anti-tamper mechanisms.
Security used to be about systems and software. As threats evolve, hardware engineers also have to familiarize themselves with trust and security terms and acronyms. If you are a hardware engineer interested in hardware trust and security, be sure to bookmark this page. If you spot a mistake or have ideas for enhancements, please get in touch.