
2026-01-20
In this episode of #KEYMASTER, Sven Rajala, International PKI Man of Mystery, and Guillaume Crinon, Director of IoT Business Strategy, explore one of the most foundational topics in product security: how trust is bootstrapped in connected devices, and why strong device identity is essential at scale.
As connected products proliferate across industries, from utilities to transportation to consumer IoT, security can no longer be an afterthought. Trust must be designed into devices from the very beginning.
Modern devices are no longer isolated systems. They communicate continuously with backend services, cloud platforms, and operational systems.
Take smart meters, for example. Utilities deploy these devices in hundreds of thousands, or even millions, across wide geographic areas. Each device regularly communicates with a central head-end system to:
For this to work securely:
This requirement applies equally to smart meters as it does to lockers, bicycles, vehicles, industrial equipment, and consumer electronics. Today, the strongest and most scalable way to establish that identity is through X.509 certificates issued by a private PKI.
Bootstrapping trust is about answering a simple yet critical question: How does a device securely prove its identity the very first time it connects?
To enroll devices efficiently and securely at scale, they must already contain a strong, unique identity when they leave manufacturing. This identity is called an initial device certificate, sometimes a birth certificate, and it is typically:
This initial identity enables the device to securely join its operational environment and obtain operational credentials later.
Bootstrapping identity is also essential for decommissioning and reusing devices. When a device is reset to factory state and redeployed to a new customer, the original identity allows the system to verify its authenticity and re-enroll it safely.
A device identity is only as strong as its protection. If cryptographic keys and certificates are stored in unprotected memory, they can be erased, replaced, or copied, allowing attackers to impersonate the device or redirect trust.
This is why secure systems rely on a hardware root of trust:
The hardware root of trust ensures that identities, keys, and cryptographic operations cannot be altered or leaked, forming the foundation for all higher-level security.
In many systems, the earliest stage of trust is established during secure boot. This often relies on:
Fusing is used to permanently store a cryptographic key or hash that the processor trusts during boot. Once programmed, it cannot be changed. This ensures that only authorized firmware can run, but it also means the decision must be correct from the start. The fusing does not implement root of trust on its own, but it is a critical mechanism for anchoring secure boot in immutable hardware.
There are three common approaches to injecting certificates and keys into devices during manufacturing:
Some silicon vendors offer personalization services:
This approach simplifies manufacturing but reduces flexibility and ties identity closely to the silicon supply chain.
In this model:
This provides strong control over identity and is the most widely adopted approach.
Here, devices are manufactured with a provisional birth identity provided by the silicon vendor.
This model enables late binding of identity and is especially useful for global distribution.
Device lifetimes are long:
This creates a challenge in a post-quantum world. If the hardware root of trust is too limited, upgrading cryptographic algorithms may not be possible. More advanced secure elements and processors, however, can receive firmware updates that introduce post-quantum algorithms.
Some platforms are already:
This makes crypto agility at the hardware level a key design decision, not just a future concern.
Bootstrapping trust is not a single feature; it is an architectural decision that shapes the security, scalability, and longevity of connected products. Getting it right early sets the foundation for everything that follows.

