SPRADO0 November   2024 F29H850TU , F29H859TU-Q1

 

  1.   1
  2.   Abstract
  3.   Trademarks
  4. 1Introduction
  5. 2The Need for a Comprehensive Security Approach
  6. 3Cryptographic Functions
    1. 3.1 Encryption and Decryption
    2. 3.2 Hashing, Digital Signing, and Authentication
    3. 3.3 Random Number Generators (RNGs)
  7. 4Establishing a Root of Trust
    1. 4.1 Secure Storage of Secrets
    2. 4.2 Preserving Key and Code Security
    3. 4.3 Secure Boot
  8. 5Secure Execution Environment
  9. 6Security Countermeasures
  10. 7Debug Security
  11. 8Conclusion

Secure Storage of Secrets

An essential component of a secure root of trust is secure storage. Secure storage ensures the confidentiality, integrity, and availability of data assets that are essential to the operation and security of the device. These data assets can include encryption keys, certificates, device configuration settings, and more. Secure storage protects critical assets from unauthorized access or modification, preventing data leakage, tampering or corruption that could compromise the overall security or safety of the application system. Secure storage of encryption keys and credentials is required to establish a secure root of trust. In a secure microcontroller, these assets are typically stored in non-volatile memory such as Flash or e-fuse arrays. Additionally, hardcoded protections that block direct read or write accesses by runtime application software are required, restricting access to immutable firmware such as ROM code or hardware loaders.