RW612 - secure provisioning

取消
显示结果 
显示  仅  | 搜索替代 
您的意思是: 

RW612 - secure provisioning

1,380 次查看
Maciej_Jj
Contributor II

Hi everyone!

I started working with RW612 and I think I read all documentation related to RW612 (User manual, User guides, Application Notes, Videos, etc...). There is at least one area that it is very hard for me to understand, could You explain to me how it works?

When I want to securely provision device, I can use MCUXpresso Provisioning Tool or nxpdevhsm from SPSDK tools to generate secure software package (SB packages). To generate secure image I have to use one, random board with RW612 (i.e. frdm_rw612). That secure image is authenticated (signed with private key bonded with RoT keys hash burned in OTP memory) and encrypted (it is done using CUST_MK_SK fuses). All of this infos are mentioned here https://www.nxp.com/company/about-nxp/smarter-world-videos/IMP-DEV-HSM-VID and here https://www.youtube.com/watch?v=UrUsczq19Iw .

That secure software then can be send to my manufacturer who flashes devices. Then I can securely provision ANY of my custom RW612 boards. Tbh, I don't understand how it is handled, that using just one eval board, I can then provision any RW612 and there is no vector for man-in-the-middle attack.

Every RW612 has its own PUF, all its keys are uniqually wrapped depending on PUF and its CKDF, but still I am able to securerly pass OEM keys to device and manufacturer can't modify it. What is common ingredient X for every RW612 that I can provision any board using just one software package?

Is NXP loading symmetric key during NXP provisioning process that allows to decode my secure software package? If yes, what will happen if that key will be breached? If there is any option to flash my 'generic' devices using my own, custom solution or I have to rely on NXP solution?

标签 (1)
标记 (1)
0 项奖励
回复
2 回复数

1,344 次查看
Ricardo_Zamora
NXP TechSupport
NXP TechSupport

Hello,

 

Hope you are doing well. The feature of device HSM and provisioning is described on the "MCUXpresso Secure Provisioning Tool User Guide v.10".

 

Could you please check this information?

 

Please refer to sections 5.1.8.1, 6.9.4.4 and 6.9.4.5.

 

Best Regards,

Ricardo

0 项奖励
回复

1,371 次查看
Maciej_Jj
Contributor II

Also I understand that we for SB images encryption we use CUST_MK_SK, but how this symmetric key is distributed securely on every device? Using SB provisioning image? Is provisioning image using different symmetric key (i.e. NXP provisioning key)? Or devices we burn CUST_MK_SK fuses for each MCU manually?

 

Any help would be appreciated!

0 项奖励
回复