The Root of Trust (RoT) is always the trusted root within a cryptographic system. Cryptographic systems use encryption keys to encrypt data and perform functions such as digital signature creation and signature verification. Therefore, in order to fundamentally guarantee the operation of these functions, a hardened hardware module that is impervious to various types of attacks is used.
The vendorprovides silicon-proven RoT IP based on VIA PUF that can be mounted on SoC
RoT is composed of detailed functional blocks such as Via PUF, TRNG, Cryptographic Accelerators(AES, ECC, AES, SHA, ARIA) and Secure Storage