Professional Documents
Culture Documents
1qAUT-N1812 Recent Advances in Secure MCU Security Offerings
1qAUT-N1812 Recent Advances in Secure MCU Security Offerings
1qAUT-N1812 Recent Advances in Secure MCU Security Offerings
JUERGEN FRANK
SR. SYSTEM ENGINEER
FTF-AUT-N1812
MAY 16, 2016
PUBLIC USE
AGENDA
• Security Use Cases and Attacks
• The HIS - SHE Specification Overview
• Crypto Service Engine (CSE) Overview
• CSE3 on Flash-less Devices (e.g. S32V243)
Security Level
Production
Vehicle Lifecycle
2010s +
• Hardware Security
Late 2000s Module (HSM)
• Crypto Services • Secure Elements (SE)
Engine (SHE) • Gateway, IVN security
Mid 2000s • Active shields
• High Assurance
Early 2000s Boot
• Enhanced • Fault detection
Censorship sensors
• Infrastructure
Mid 1990s
• Censorship
• Infrastructure
SE Braking Powertrain
SE Braking Powertrain
TCU TCU
Safety domain
Safety domain
Gateway Comfort domain Gateway Comfort domain
OBD OBD
IVI Cluster Body IVI Cluster Body
Wildcard UID
Secure Boot
Overall data
Core
Key Usage
Protection
Activation
Debugger
Plain Key
Counter
Failure
Write
bits
Host to CSE
Interrupt
AES RNG
Debugger
connected
MASTER_ECU_KEY X X X X X 160 IP SkyBlue-IF Host XBAR-IF
Inter.
2.Sequential Boot – SHE module comes out of reset and verifies the custom code, after the
application core comes out of reset and execute the code (independent of secure boot result!)
Sequential Boot – SHE module comes out of reset and verifies the custom code, after the
3.Strict
application core comes out of reset and execute the code if secure boot finalized positive
Security
Programmable by
Features customer
EVITA-Medium
(Symmetric Cipher)
CSE2 CSE3
CSE
S32K security; SHE
CSE SHE compliant cost-effective
CSEc
compliant CSE enhanced security solution
security module by additional
security features
Time
2010 2011 2012 2013 2014 2015 2016
Secure „Firewall“
• Secure Boot support FLASH
PB-IF SRAM
MI BIU
Sec. FLASH UTI
• Secure flash blocks are fix assigned to the CSE module. No other masters can on/ Test Interface Array
access these memory off Test Interface BIU
Secure CSE
Debug (Automotive
SHE module)
Domain
Support
On-The-Fly
decryption
juergen.frank@freescale.com
25 PUBLIC USE #NXPFTF
Boot Flow I – Controlled by ROM Code
System
OTP Field Size Programm by Usage
Access
Secret Key 128 --- Freescale; SHE-Secret Key, random number
IAK 128 --- programmed and ISP code protection key
locked during
UID 120 R device production SHE UID value
if (Secure Counter > 1)
Customer;
for encryption of the CSE image files
Flash Key 128 W programmed and
if (Secure Counter == 0)
locked
use 0 for image encryption
Customer; Prevent rollback-attacks
Secure Counter 128 R/W
programmed (re-usage of old images)
0x07 LOAD_KEY Load Key 0x14 TRNG_RND Generate TRNG Random Number
In <AN4234SW/tools/bin>
AES_CMAC_CMD.exe
Usage AES_CMAC_CMD.out <Key Value> <Message Length in Bits> <Message File name>
AES_ENC_CBC_CMD.exe
Usage AES_ENC_CBC_CMD.out <Key Value> <IV Value> <Message File name>
AES_ENC_ECB_CMD.exe
Usage AES_ENC_ECB_CMD.out <Key Value> <Plaintext Value>
AES_MP_KDF_CMD.exe
Usage is AES_MP_KDF_CMD.c <key value> <key constant>
MPC564xB/C CSE
( internal flash)
all 32bit-MCU segments MPC5748G / MPC5746C
PowerPC
e200
HSMv2
MCU
− Low – CSEc MPC5777C CSE2
− Mid – CSE Radar MCU CSE2
− High – HSM with CSE firmware ARM Cortex-
MAC57D54H CSE2
A5/M4
CSE3 / OTFAD/
(flash-less)
S32V243
ARM Cortex- TrustZone
MPU
Ax/Mx
VFxxx Trust Zone
& ARM9/11
+ CAAM
i.Mx