Encryption with MPC560D

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Encryption with MPC560D

538 Views
mikepinto
Contributor I

Hello,

I am using MPC5602D for an automotive product which is an Electronic Control Unit (ECU) for HVAC control. I want to protect my device from reverse engineering. To clarify the requirement in detail,

 

1. Once the final binary is ready for manufacturing, it will be provided to the contract manufacturer (CM).

2. The CM will use standard tools (could be gang programmer or so) for flash programming the binary.

3. For future device upgradation, the binary will be provided to the support or service personal for upgrading the device.

 

Q. I want to protect the binary from illegal use at both the above levels. What are different ways to protect it?

Q. I tried understanding implementing different algorithms for this. To my knowledge, I understand that the MCU also needs some form of support like having hardware crypto acceleration unit etc for using complex algorithms. Does MPC5602D supports such complex algorithms?

Q. Can I build above said algorithms without using bootloader application? I am using JTAG interface for flash programming the binary.

 

Your earliest help in this regard will be highly appreciated. Thanks in advance.

Mike

Labels (1)
0 Kudos
2 Replies

431 Views
davidtosenovjan
NXP TechSupport
NXP TechSupport

The only advanced protection method MPC5602D device offers is censorship.

Censorship feature is a way to prevent unauthorized access to the device. It can be achieved either by disabling of internal flash accesses or/and disabling of JTAG/Nexus client (protected by private password).

Customer will use Serial Password for downloading of user code to the RAM or JTAG Password for enabling debug of a censored device.

Details you may find under section 5.2 Boot Assist Module (BAM).

I must note it is very sensitive thing. It is needed to use it very carefully, because an inappropriate usage can lead in making the device useless. If user accidentally erases shadow flash/row, followed by reset, there is no chance to recover it (unless it had been though about before).

If the device is censored and user doesn’t have any pre-prepared recovery code located in the internal flash memory, there is no way how to unlock it and everything he can do is to order new sample device, and re-solder it instead of the censored one.

Q1) There is no way how to encrypt binary file over reverse engineering on this device. If third-party providers participates on the programming they will need JTAG/Serial Password allowing access to censored device as well, thus they could possibly reveal the password or original code. It is apparently needed to have signed some sort of agreement between this provider and you to avoid this.

Q2) I can imagine that device could have implemented some sort of flash resident bootloader, maybe it could manage some sort of decryption. Unfortunately I don’t know if some solution exists. Definitely there is no hardware support for such operation on this device.

Q3) No, I don’t think so.

0 Kudos

431 Views
mikepinto
Contributor I

Thank you David for clarifying the things.

Best Regards,

Mike

0 Kudos