Operating Systems Question 4. A secure boot scheme adds cryptographic checks to each stage of the boot process. This pr...
4. A secure boot scheme adds cryptographic checks to each stage of the boot process. This process aims to assert the integrity of all software images that are executed, preventing any unauthorized or maliciously modified software from running. The most logical cryptographic protocol to apply is one based on a public-key signature algorithm. n a public-key signature algorithm-based protocol to realize the secure boot scheme. Your answer should Desig evaluate the following public key storing specify the usage of public and private keys; also, your answer should methods: () embed the public key in the ROM, (2) store the publie key in One-Time-Programmable (OTIP) hardware, and (3) store a hash of the public key. (30 marks)
4. A secure boot scheme adds cryptographic checks to each stage of the boot process. This process aims to assert the integrity of all software images that are executed, preventing any unauthorized or maliciously modified software from running. The most logical cryptographic protocol to apply is one based on a public-key signature algorithm. n a public-key signature algorithm-based protocol to realize the secure boot scheme. Your answer should Desig evaluate the following public key storing specify the usage of public and private keys; also, your answer should methods: () embed the public key in the ROM, (2) store the publie key in One-Time-Programmable (OTIP) hardware, and (3) store a hash of the public key. (30 marks)