I am using the LPC43S67 and encrypted code to prevent cloning of a product. CRP3 is set so I assume all is good and secure. However I saw a presentation at a security conference showing how to break NXP code read protection using a glitch attack. The presentation showed how quickly and easily CRP can be broken on the LPC1114. Is there anything that can be done to make this attack harder?
Hi philip
For secure applications, NXP recommends programming CRP level 3 as you have already configured. Can you kindly enter a support ticket with more details on your product security requirements so that we can propose the best options that may fit your needs?