Chain of Trust – Cryptography Primer Part 5 | Videos
Chain of Trust – Cryptography Primer Part 5
Establishing a root of trust help making sure devices that are supposed to be part of a network at genuinely validate to be part of this network, in other words, securely authenticated.
Watch the full video to find out about how public key infrastructure (PKI) is used to secure a wide range of devices that need to be connected.
For more information, please visit:
http://www.microchip.com/security