3186 views|1 replies

6388

Posts

8

Resources
The OP
 

Live FAQ|Microchip's Trusted Platform for CryptoAuthentication Series [Copy link]

Live Details: Microchip's Trusted Platform for CryptoAuthentication Series

Live Topic: Microchip's Trusted Platform for CryptoAuthentication Series

Live lecturer: Zuo Guofu

Excerpt from the Live FAQ:

1. What asymmetric encryption algorithms does the chip support?
A: – ECDSA: FIPS186-3 Elliptic Curve Digital Signature – ECDH: FIPS SP800-56A Elliptic Curve Diffie-Hellman – NIST
Standard P256 Elliptic Curve Support
2. Has MICROCHIP launched ARM chips?
A: In 2016, ATMEL was acquired, and there are complete M0+ M4, M7, ARM8, A5 products.
3. What is the static power consumption?
A: The 204A chip will automatically enter sleep mode when not working, and the sleep current is less than 150nA;
4. Does 3-pad also use IIC or UART communication?
A: 3Pad uses single-line UART communication.
5. How many private keys can be preset on 608
? A: 608 can preset up to 8 private keys, but they are usually not used up. There is only one that truly identifies the identity.
6. How many sets of private keys can be preset on 608?
A: 8 slots support private keys.
7. How many levels of pipeline processing does the CryptoAuthentication series use?
A: ASIC, there is no such thing as pipeline
8. Is there a dedicated encryption chip? Or must it be integrated into the MCU?
A: ATECC204, 608 are both independent dedicated encryption chips!
9. For OTA, does the official have any relevant solutions? It is very easy to use.
A: ATECC608A secure boot entry use case, http://www.microchip.com.cn/newcommunity//Uploads/2019/00002591b_cn.pdf for reference
10.
Is there any difference between security controller, security authenticator, and SE?
A: ATECC608A is an independent security chip that needs to be plugged in to the outside of the MCU. Some MCUs have internally integrated security features.
11. What cases use this platform?
A: AWS, google Iot
12. What is the smallest package of encryption chip at present?
A: The smallest UQFN 2x3 in the datasheet. If you need a smaller package, please contact Microchip
13. What is the MCU package of CC608A? Is there any corresponding development application software?
A: ECC608A is an independent security chip, not an MCU. The packages include SOIC-8, SSOP-8DFN8 and SOT23.
14. What is the performance of the microprocessor of ATECC608A? Can it be used as a security controller for small IoT devices?
A: ECC608A is an independent security chip that needs to be connected to the MCU.
15. Can you send the link of the trusted platform again?
A: https://www.microchip.com/design-centers/security-ics/trust-platform
16. What is the access interface?
A: I2C or single-line communication
17. Does this solution have any practical application cases?
A: IoT device authentication, IP protection, secure boot, accessories, consumables, data encryption, etc. AWS, Google platform, etc.
18. What are the security encryption chips?
A: MCU category includes SAML11, CEC1702, SAME7x; MPU SAMA5Dx; FPGA, SmartFusion2 PolarFire
19. What is the product life cycle and service period of the encryption chip?
A: Microchip's encryption chip is backward packaged, functional, and register compatible!
20. Is Microchip's latest trusted resource configuration fixed and modular? Can users customize it according to their own needs?
A: Microchip provides several usage scenarios, including Trust&go, which is pre-configured, and trustflex for different scenarios. If these scenarios are not applicable, there is also
trust custom, which is completely customized according to your needs.
21. Does the security chip have relevant certification?
A: Microchip security products have relevant certification ratings.
22. Are all the chips automatically dormant?
A: Microchip's ATSHA204A and ATECC608A are. They can also be controlled by software not to enter dormancy.
23. Is the supply stable?
A: Microchip has its own factory, and the supply is very stable. And basically there will be no EOL
24. What are the requirements of NDA?
A: NDA is a confidentiality agreement, which mainly prohibits the disclosure of information to third parties
. 25. What data is used to store the OTP Zone of ATECC608A? Can it be written by users? What about ConfigZone? Thank you.
A: OTP data can be used as some written data, can participate in secure encryption operations, or can only be stored. The configzone function is used for configuration and can be written.
26. What are the cases?
A: IP protection, consumables, accessories, secure boot, IoT certification mentioned in the ppt.
27. Can these designs achieve pin2pin replacement?
A: SHA204 and ECC608A are PIN TO PIN compatible?
28. What algorithms can be implemented? ?
A: SHA256, ECC sign verify, ECDH, AES, etc. It depends on the specific chip.
29. What is the power consumption performance of the chip?
A: The maximum sleep current is 150nA
30. What kind of packaging does this module ATECC608A use?
A: SOIC8, DFN8, SOT23, SSOP8
31. What are the differences between security chip, security authenticator, security controller, SE, and TPM?
A: TPM is a standard device with complete standards, including interfaces, and is universal for all manufacturers. Security chip SE is only used for secure key storage and algorithms, security controllers, and MCUs with internal security engines.
32. What modules need to be configured for secure encryption hardware?
A: Security is divided into different levels. For example, bank transactions require a very high level. Choose different modules according to the requirements of your encryption system. Microchip provides a series of products to meet the requirements of each level. MAC calculation is the most basic need.
33. Can you introduce a few application cases?
A: We cannot disclose customer information for security applications. The IP protection, consumables, accessories, secure boot, and IoT certification mentioned in the ppt.
34. Does this function package for MCU configuration of other manufacturers support it?
A: It is written in standard C. It can be used for simple transplantation.
35. Do you need to use PYTHON to use this SHA204?
A: It is not necessary. Our development tools support python, so it can be used flexibly.
36. From what amount of usage, can you customize the secret key for the customer? Can you write your own secret key?
A: Different models have different minimum orders, with a minimum order of 10 pieces. We cannot provide customized keys, which are generated by the chip itself. Of course, customers can define their own keys, but the security of these keys needs to be guaranteed by the customers themselves.
37. Does the key need an independent cloud server?
A: No.
38. When the chip receives the verification command to start the operation process, does the main controller need to add a waiting time of 4 seconds for the result output?
A: It doesn’t need to be that long! Each of our commands has a corresponding operation time. Asymmetric sign and verify only need tens of milliseconds.
39. Does this have to pass AEC-Q100 certification?
A: Not necessarily. Q100 is only required for automotive applications.
40. Can the Vienna algorithm be implemented? Is there a reference design ?
A: The Vienna algorithm is not supported.
41. What certification has been passed for automotive regulations?
A: There are special chips for automotive regulations, which have passed AEC Q100 certification.
42. What is the cost of the chip? Will the increase affect the programming of the controller? Will it increase the amount of code for the controller?
A: For cost issues, you can consult your local MICROCHIP sales office staff or refer to the prices on the MICROCHIP official website. Because of the added security function, the MCU needs to add corresponding code. Thank you!
43. How long is the life cycle of the security chip?
A: The storage life is at least 30 years.
44. Can the key be cracked?
A: The key stored in the 204A and 608 chips can be configured to not support reading; it is also difficult to obtain physically.
45. How long does it take to complete the entire verification? From experience.
A: The signature time of a simple ECDSA is 150ms, and the verify operation time is 100ms.
46. Can it be crack-proof?
A: Of course, this is a must for encryption chips.
47. Is there any sample code available?
A: Of course. This development platform includes sample code
. 48. What is the difference between ATECC608A-TNGTLSx-B and ATECC608A-TNGTLSx-G?
A: Both are UDFN, but one is tube-packed and the other is reel-packed. A reel of reel packs 2000 pieces.
49. What is the power consumption of these encryption chips?
A: They are all the same chip ECC608, so the power consumption is the same
. 50. If the communication is encrypted, is the data of the communication encrypted or is it just a security verification before the communication?
A: Both are required. In layman's terms: Verification is to ensure that you are communicating with the right person and the information has not been tampered with; Data encryption is to ensure that a third party cannot understand your conversation.
51. How many times can the chip be read and written? The reading frequency increases significantly, and the probability of hardware failure increases.
A: There is no limit on reading, and at least 400,000 times when writing at 85 degrees.
52. Will chip-level cracking be effective?
A: For our security chip, this is invalid. We have added security protection measures.
53. Is the secret key of each device of ATECC608 determined at the time of production? Or is it configurable?
A: The asymmetric key is generated by the chip itself inside the chip. If it is a symmetric key, it needs to be written.
54. What is the operating temperature range?
A: Non-automotive grade -40~85. Automotive grade -40~125
55. What are the functions of this platform?
A: The platform can support a variety of application scenarios, such as TLS connection, secure OTA, IP protection, etc. At the same time, it provides a service, which is what we call resource pre-configuration service, and some reference codes for application scenarios.
56. Can this chip be used for FPGA configuration Flash encryption?
A: This chip can be used for FPGA encryption, but if the FPGA key itself is cracked, what is the use of encryption! Microchip FPGA itself is not crackable (acquired from microsemi), with a capacity ranging from 100LE to 480KLE, widely used in aerospace, defense, industry, medical and communications, and can meet the application of various industries.
57. What advanced peripherals can dsPIC33CH provide?
A: It has nothing to do with the topic. CH dual-core, high-precision PWM, high-speed ADC, time is limited and can only be high-speed. Contact Microchip for details
58. Teacher, what is the main function of PFC and what should be paid attention to when designing?
A: It is different from this topic. Microchip is strong in digital power supply. You can consult the local Microchip representative. We have a dedicated power supply team.
59. How many outputs can PWM have at most? How to avoid multi-channel competition?
A: It is irrelevant to the topic. PWM is generated by hardware and there is no competition. The specific number of outputs depends on the type of MCU and the type of application.
60. How do you generate the unique serial number of your chip? Is it possible to crack it?
A: It is randomly generated by the factory. The serial number can be read. What does cracking mean?
61. What is the safe working temperature range?
A: Industrial grade -40-85C, automotive grade -40~125C
62. Is the encryption algorithm selectable or fixed?
A: Fixed. There are different options depending on the chip. For example, our ATECC608A supports SHA256, ECC256, AES128, ECDH, etc.
63. What is the budget for Trust & Go? Take 10PCS as an example, thank you
A: You can ask the local sales office staff of MICROCHIP about the price, or learn about it on the MICROCHIP official website.
64. Is it convenient to provide the software and hardware reference documents for remote firmware upgrade?
A: The official website has an entry-level use case for ATECC608A secure boot,
http://www.microchip.com.cn/newcommunity//Uploads/2019/00002591b_cn.pdf.
65. Does the system ADC have DMA control?
A: It seems to be irrelevant to the topic. However, many microcontroller ADCs have DMA control.
66. I looked at the entire signature time and felt that it was a little long. This will affect the efficiency of CPU operation. How should I avoid it?
A: A few dozen ms, not long. It is considered fast.
67. What are the major agents of Microchip in the Yangtze River Delta?
A: See Microchip's official website
68. What is the level of electrostatic protection? Is there any reference design to provide?
A: Static electricity is a system problem. Our chips have corresponding electrostatic levels and application notes on electrostatic design.
69. Can the tool kit be applied for free?
A: Ask the local Microchip representative-agent or Microchip employee.
70. What kind of technical support can be provided?
A: It depends on your application. There are many resources available on the official website. You can also find a local Microchip representative or invite us for on-site support.
71. Please recommend a low-cost security chip model that can protect the microcontroller program. I will check the specific user manual.
A: Please refer to SHA204
. 72. For secure communication authentication, does it require multiple handshakes?
A: Please refer to the TLS handshake process.
73. Can ATECC608A be used on other MCU platforms?
A: Yes!
74. Can the signature be authenticated offline?
A: Yes!
75. When not in use, can the power be turned off directly?
A: Yes, the key will still be saved after the power is turned off, thank you!
76. Can a chip like SHA204 be regarded as a memory that is not easy to be cracked in terms of usage effect?
A: Yes. But it is not limited to this. There is also algorithm and configurable flexibility.
77. Can the encryption IC be written? Can some certificates be stored?
A: Yes. Yes.
78. Can the platform be upgraded?
A: Yes. We will also update the version on the official website regularly.
79. Is there anything related to Bluetooth that can be used?
A: Yes. We have a demo of Bluetooth using a security chip. Implement authentication and ECDH key exchange.
80. It looks quite suitable for the Internet of Vehicles. Everything discussed in it can be used in the Internet of Vehicles
. A: Yes. We have automotive-grade security chips.
81. Can you provide the code when purchasing the chip?
A: You can refer to the code of each application scenario in the trusted development platform kit.
82. What data is initialized by ECC608A in the AVR-ioT development board? Is there any document introduction?
A: You can check the data sheet of Trust&go, which contains a description of the content.
83. Can D21 do Bluetooth + ECC608
? A: Yes, there is a secure avr BLE IOT node case on the official website.
84. Is the secure authenticator simply an external flash?
A: You can see on the left that it is a secure EEPROM, which can ensure that the content stored in it cannot be read, and it also supports some encryption algorithms.
85. What is the simplest entry-level encryption chip? Which one can you recommend? Is there a simple example, mainly used for IOT communication?
A: You can consider using the Trustplatform product we introduced, which has code examples
. 86. As an IoT device developer, the current R&D cost of IoT devices is quite tight, so I would like to know the approximate price of this chip in the case of thousands of pieces.
A: You can contact Microchip sales or agents.
87. After the secret key is configured to be unreadable, how do we use it?
A: You can obtain the corresponding public key through commands and verify it through the public key.
88. How to use remote verification?
A: You can use symmetric or asymmetric authentication, through random number challenge, or through certificate authentication.
89. How is the key generated?
A: It can support external generation and burning, and also supports internal random generation of private keys.
90. Can you ensure the specified quantity of production?
A: You can specify the quantity
. 91. Does the dsPIC33CK DSC support debugger development?
A: It must support it
. 92. How to strengthen security protection for Bluetooth applications? What measures are there?
A: Bluetooth itself already has some security measures, but our security chip can further strengthen it. We have a document that explains in detail how to use the security chip to strengthen secure data connections, mainly strengthening the authentication method and building secure task keys. You can contact our engineers for details.
93. Does this platform have any restrictions on domestic customers?
A: No.
94. Will this IC be replaced by someone directly simulating the data on the IC interface bus?
A: The random number sent each time is different, and the secret key is involved. It cannot be simulated without knowing the secret key.
95. What are the advantages of asymmetric use cases?
A: Secret key distribution is relatively easy and secure, and it is easy to manage through the certificate chain. The private key chip can be generated internally, which is the safest.
96. During use, is the key fixed or can it be changed at any time?
A: The key is fixed, but you can use ECDH for key exchange and negotiation to get a different session key each time.
97. Are there any products for national secrets?
A: We don’t have any at present.
98. Is there a cloud platform solution currently in place? Or is there a verification demo?
A: Currently, there are Alibaba Cloud, AWS Cloud, and Google Cloud solutions. Demos can also be found on the official website.
99. What is the difference between sPIC30F2010 and PIC30F2010?
A: Your model input is incomplete. For details, please contact your local MICROCHIP technical support staff.
100. What is the bandwidth of ATECC608 for AES encryption?
A: What do you mean by bandwidth? Processing speed? The speed of AES128 is 1ms.
101. Can the internal information of ATECC608 device be read?
A: Configuration information can be read. The data content is determined by the configuration. If it is configured as unreadable, it cannot be read. Otherwise, it can be read.
102. Microchip's latest trusted platform. This is a three-layer resource configuration service designed specifically for Microchip security devices. What are the three layers?
A: Device layer, application layer, and later preset service layer
103. Does verification require resources and take a long time?
A: It depends on your verification method. Different verification methods take different time. Asymmetric methods take a long time, but it can be completed quickly with a security chip, about 100ms. If it is done with software, it may take several seconds.
104. How much MCU RAM and Flash resources will CC608A use ?
A: It depends on the application. Our own library is about 10+K Flash and 3+K RAM, but it can actually be streamlined.
105. Are the old atmel products currently in stable supply?
A: If they are not special, they are basically stable.
106. How
efficient is this? A: If you mean the execution time, the security chip completes the asymmetric signature and verification time is about 100ms, but the same algorithm takes about 5s to complete under the M0+ 48M clock.
107. If the key is on the flash, can it prevent disassembly?
A: If it is placed in FLASH, it cannot prevent disassembly.
108. How is the encryption key generated? If there are many products of the same model, does the key of each product need to be different?
A: If it is an asymmetric key, it is generated inside the chip itself, so the private key of each chip is different.
109. How is the reliability of the chip? If there is a problem with the chip, will it affect the function of the system?
A: If there is a problem with the chip, it will affect the operation of the system. Microchip's products have strict production test standards, and the annual shipment volume is very large! Reliability is guaranteed.
110. During the management and use of keys, do users need to always connect to the Microchip server? Are there any restrictions on the access devices on the client side?
A: It is not necessary to connect to Microchip during use
. 111. Is the Microchip Trusted Platform free?
A: Yes.
112. Does the 33C power supply only support 3.0 to 3.6V?
A: Yes.
113. Is it hardware-based?
A: Yes.
114. If it is cloud-based, does the authentication need to go through the cloud? What are the benefits of this?
A: Yes, MICROCHIP will cooperate with various cloud platforms and adopt their security authentication mechanism strategies.
115. This is to provide a secure solution, not just a product.
A: Yes, a solution from development to product
116. To connect with the cloud, does the cloud server also need to support your secret key (certificate)?
A: Yes, but the cloud usually supports this algorithm, so there will be no problem
117. Can ATECC608A be used with any MUC?
A: Yes, the interface is I2C or single-line communication
118. If the customer chooses an encryption chip, the cloud software must also add decryption code?
A: Yes.
119. Does SHA currently support up to 256?
A: Yes. The currently mass-produced ATSHA204A and ATECC608A support SHA256.
120. Does runtime verification take up resources?
A: It will take up some space, but the main verification work is done by the security chip. The MCU mainly controls the security chip.
121. Is the random number generator of this chip a true random number generator or a pseudo-random number generator? Has it passed the national level certification?
A: It is a true random number, which must pass the certification to meet the standard NIST SP 800-90A/B/C certification.
122. Is there a SHA204 host computer operation learning and operation manual?
A: First of all, you need a development board, host computer support, and you can also operate it through python.
123. What are the requirements for the peripheral circuit of the dsPIC33 minimum system?
A: The data manual has a minimum system.
124. Is it that the master key cannot be read out, or all the keys cannot be read out?
A: The private key cannot be read out.
125. How to ensure the security of the private key when uploading the trust flex application to the official website?
A: The private key is not generated by you, it is generated by the chip itself inside the chip. What you need to send to MICROCHIP is the resource preset setting file.
126. Is it possible to hack the key-based chip from the outside?
A: Although it is not absolutely impossible, the difficulty of this hack will be very high.
127. Is the trusted platform a LAB that supports a series of encryption chips? Or an API function library?
A: It is a solution, including application scenario configuration, prototype design, software development and product production.
128. Does it need to run continuously? Is the low-power application scenario suitable?
A: Usually the encryption chip itself will only wake up when needed, and will enter a low-power state after the work is completed.
129. For a security chip, is the private key fixed? Or is it newly generated every time it is applied?
A: Usually the private key is fixed, but each time it is applied, either a random number is added, or a derived key is used, or a session key is temporarily generated; the principle is that the key seen by the outside world changes every time.
130. Does ATECC608A have a data book?
A: There is a summary data book in Chinese on the website: http://www.microchip.com.cn/newcommunity//Uploads/201812/5c073f6f4562b.pdf. For
the full version, please contact Microchip sales.
131. Is one chip one key the same as unique ID? If not, what is the use of unique ID?
A: The unique serial number can help achieve one chip one key, so that the key and serial number are bound.
132. To achieve cloud authentication, what special settings are required for configuration and encryption?
A: We have a data sheet for Trust&Go, which explains the configuration and storage content. You can refer to it.
133. Can the key be cracked without reverse query?
A: Our security chip allows third parties to crack it, and they cannot crack it. Level 1-31 is defined as the highest level.
134. What measures have been taken in terms of security?
A: Our security chip is designed with measures to prevent physical attacks. For example, we have active shield and also add means to prevent side-channel attacks. At the same time, we choose high-quality random number generators and internationally recognized security algorithms.
135. What are the advantages and disadvantages compared with competing products?
A: Our products are more secure, have more abundant resources, and better technical support.
136. Can the public key be written to efuse?
A: Our product is that the public key can be placed in the encrypted EEPROM. The specific read and write properties depend on the application scenario. The public key can be read at any time during authentication. When doing a secure boot, the public key is readable in the eeprom but cannot be rewritten.
137. Which development platform of Mictochip MCU is suitable?
A: Our evaluation board is based on ATSAMD21, and it will be more convenient to use this MCU platform.
138. Do you also provide library files for other microcontrollers?
A: We provide CryptoAuthLib, CryptoAuthLib is a software support library for the ATSHA204A, ATECC108A, ATECC508A and
ATECC608A CryptoAuthentication devices written in C.
139. Do you have plans to apply it in vehicles? Now the Internet of Vehicles, especially v2x, has a rigid demand for encryption and security.
A: We now have application cases on TBOX. Regarding the in-vehicle MICROCHIP, there will be a new device TA100 that meets the AECQ100 specification
. 140. Which car manufacturers use these models?
A: We have another series of products for security chips used in automotive products. Please contact our staff for details.
141. What solutions does microchip have in the embedded field?
A: We have secure boot, anti-counterfeiting, IP protection, and various cloud connections.
142. This security solution has been seen by several companies. What are the main advantages of this solution?
A: We have many years of experience in security chips. In addition to the security and performance of the chip itself, this platform can easily let users understand the process of different applications, and quickly implement and understand the security implementation process. The chip uses hardware to implement the algorithm, which is fast, low power consumption and good cost!
143. What are the advantages of ATECC608A compared with the current security chips on the market? How about low power performance?
A: We have rich experience in designing security chips, high security, and fast hardware implementation of ECC algorithm. Sleep power consumption is 150nA.
144. Does the security test provide a test report?
A: We have a third-party test report. You can contact our company staff for details.
145. If you use D21 to design ECC608, where is the guide?
A: We have some routines for D21 and ECC608. There is a Hand-on at MASTERS this year. You can contact our technical support to obtain it.
146. For Bluetooth products, do you have any special suggestions on security? The product of a company I know uses Bluetooth to connect to Xiaomi speakers. After selling it abroad, someone can control dozens of devices at the same time. Security is too poorA
: Many IoT products nowadays do not consider security and have many hidden dangers, which is also the purpose of organizing this security seminar. Adding a security chip can solve these security problems.
147. Does the security chip need to be plug-in? Is it integrated in the MCU?
A: The plug-in is currently used, and MICORCHIP is also developing an MCU with an integrated security chip.
148. Is there a development version available?
A: Apply to Microchip representatives (agents or Microchip employees), and they will apply according to their permissions. It may not be provided free of charge.
149. The random serial code directly generated by the foundry is not secure enough. It is recommended that the chip can add a hardware serial number generation module, such as a physical unclonable functionA
: The serial number of the chip is fixed when we leave the factory, ensuring that each piece is different150
. Does the key have a period? How long is it?
A: The chip does not have this concept. It is determined by the application. If it is a certificate, the validity period can be set.
151. Do both sides need to pre-set a mutually trusted secret key? Or is it automatically generated?
A: Yes, but it is not necessarily preset. It can be achieved through the trust chain. The private key of the security chip can be generated by itself.
152. Can you briefly talk about the production line injection process of the key? Do you need special equipment?
A: It depends on whether it is symmetric or asymmetric. The process is different. If the security requirement is high, there are requirements for the environment and equipment.
153. What are the precautions for pre-setting?
A: A safe environment is also required for pre-setting. Pre-setting and locking are irreversible.
154. Hardware encryption or software encryption? Compared with the previous encryption IC, what are the advantages?
A: Hardware encryption isolates the secret key and software, which is safer. The algorithms and processes supported by the current encryption IC are the most advanced.
155. Is it hardware encryption or software encryption?
A: Hardware encryption.
156. Does the command of single-line communication have CRC check?
A: Yes.
157. Does Microchip have a CA server?
A: Yes
. 158. Is there a solution to connect with Alibaba Cloud?
A: Yes, the AVR_IOT evaluation kit is provided in China, which realizes the connection with Alibaba Cloud!
159. Is there a difference between signature and integrity verification?
A: Yes, signature is used to verify identity, and integrity verification is used to verify whether the text has been modified.
160. Is there a simpler GUI graphical interface programming tool?
A: Yes, our ACES is a GUI interface.
161. Will the upgraded version of 204A support asymmetric encryption?
A: Yes. ATECC608A
162. In addition to ATmega4808, are there development boards based on PIC chips?
A: Yes. Which development board do you mean? If it supports security chips, PIC chips can support it. If it is cloud connection, there are also different options.
163. Is there an automotive-grade version?
A: Yes. NDA is required.
164. Does the official have relevant test development boards?
A: Yes. There is a description in the live PPT. Visit the official website or ask the local Microchip representative.
165. Hello, teacher, have you designed a data upload to the cloud platform? The simplest hardware configuration and operation process
A: Yes, ATmega4808 AVR IoT WG connects to Alibaba Cloud, etc. ATMEL START has routines
166. Are there any relevant reference cases?
A: Yes, you can log in to the website to obtain https://www.microchip.com/design-centers/security-ics/trust-platform, or contact technical support
167. Does the Microchip product line have MCUs with encryption functions?
A: Yes, it depends on which scenarios are applied. SAME series and SAML11
168. Are there any routine references for these?
A: Yes, just find the application scenario that suits you
169. Encryption chip, how to use it in the program, is there a routine?
A: Yes, you can contact engineers or technical support for support
170. Does the CUSTEM version have mass production tools?
A: There are evaluation tools. Mass production is carried out in the MICROCHIP factory.
171. Microchip manufacturers require our company to sign an agreement? What is the biggest breach of contract liability?
A: Some materials need to sign NDA, that is, confidentiality agreement, and some do not. You can check it on the official website. If all the materials are available, then NDA is not required. If not, NDA is required. The breach of contract liability can be found in the specific terms.
172. Is there an application tutorial in the Trust platform design toolkit?
A: There are instructions for use of application scenarios, which can be referred to. Thank you!
173. If the key is lost or forgotten, how to retrieve it? Will the original configuration be lost?
A: The original configuration can be retrieved, but the key in the chip cannot be retrieved.
174. How is firmware IP protection achieved?
A: A security chip is placed on the PCB. When the firmware is running, it needs to verify whether the security chip has the correct secret key. Even if the firmware is copied, it cannot run, so as to protect the code.
175. The program is on the MCU. Through I2C plus a security chip, how to protect the MCU code from being copied?
A: Place a security chip on the PCB. When the firmware is running, it is necessary to verify whether the security chip has the correct secret key. Even if the firmware is copied, it cannot run, so as to protect the code.
176. What kind of protection is provided for application scenarios that need to protect the microcontroller user program?
A: Place a security chip on the PCB. Even if the microcontroller program is read, the secret key of the security chip is required to run the program to protect the code.
177. How many years can the data be retained at most?
A: It can be saved within the life cycle of the security chip product .
178. Are there any application cases in China?
A: There are many application cases in China, including IP CAMERA, one-time use product authentication, IP protection and anti-cloning, secure updates of device firmware, and IOT applications connected to the cloud.
179. Is the power consumption too high?
A: In most of the time, it is in sleep mode, about 150nA. The current is higher when doing ECC. However, because our execution time is short, only 100ms, if we use MCU to do it, it will take 5 seconds, and the working current of MCU will not be less than that of the security chip.
180. Teacher, how are the certificates and public keys delivered and generated? Do they require additional fees?
A: They are processed in our secure HSM, and the cost is included in the chip .
181. Does the encryption chip key have an expiration date?
A: It is valid throughout the product life cycle, and the life of the chip's own EEPROM is 50 years (typical value).
182. How long is the validity period of the hardware protection isolation key?
A: It is safe and effective throughout the product life cycle, and the life of the data storage in the chip is 50 years (typical value).
183. Do you have plans to arrange an introduction to TPM?
A: There is no plan for the time being. If you want to learn about TPM, please contact Microchip
. 184. How many outputs can pwm have at most
? A: This is a security product! If you use PWM, you can choose Microchip's MCU or Microchip FPGA. For FPGA, as long as the resources allow, you
can have as many PWM channels as
you want. 185. What is the highest precision of dsPIC33 PWM? What is the impact of high precision on the system? Power consumption?
A: This is not the content of this seminar. You can consult your local technical support staff of MICROCHIP after the meeting on this issue. Thank you!
186. If the device and the cloud are authenticated, if an M0+ MCU is used as the main control and ECC508A is added, how long will the entire authentication process take?
A: This depends on whether you are doing a two-way authentication. If it is a two-way authentication, it will take longer, about 1 second.
187. How difficult is the development?
A: This development platform has corresponding codes and instructions, and development is very easy.
188. Are there any trial activities for Microchip chips or development platforms?
A: This platform itself is free, you can use it directly, thank you!
189. In this trust screen platform, the host computer communicates with Microchip's MCU. Can the host computer program also be encrypted? How does the host computer get the secret key of each different MCu for communication?
A: This depends on your design. In principle, it can be realized. The host computer can communicate with each MCU to communicate securely.
190. The people at the Microchip headquarters told me that I must sign an agreement with the company, otherwise your chip cannot be used? The company leaders are afraid of taking responsibility. What should I do?
A: Does this refer to the export control agreement? This agreement is not required by us, but by the US government. It mainly states that you will not use this type of managed chip in some unauthorized products or export it to some unauthorized countries.
191. How long is the delivery time for this batch purchase?
A: You can consult your local MICROCHIP sales office staff.
192. How long is the cycle from ordering to picking up the goods using Microchip's secret key factory burning?
A: You can consult your local MICROCHIP sales office staff for this question. Thank you!
193. How big is the power supply connected to the PIC series microcontroller?
A: This question is not related to this seminar. Generally, it is 5V or 3.3V.
Which model of 194 and 204 is shipped the most now?
A: This requires production statistics, and I don’t have data for the time being. We support customers with SOIC, QFN, SOT23, I2C, and single bus. The user base is quite wide.
195. What is the approximate price of ECC608?
A: Please consult the local Microchip agent or sales for the price.
196. What is it used for? Preventing firmware from being read or protecting communication?
A: All of these are possible, and it can also achieve secure connection to the cloud, SECURE BOOT, one-time product authentication, etc.
197. Is the random number generator true random or pseudo-random? How is it guaranteed?
A: True random number, this needs to be certified
198. Does the CryptoAuthentication series support online programming and offline programming?
A: Yes.
199. Does MPLAB IPE v3.15 support HEX download?
A: Yes. But now it is version V5.xx.
200. What encryption methods are there?
A: Support ECC256, SHA256, AES128
201. What chip encryption supports
A: Support ECC256, SHA256, AES128 algorithms
202. What are the big differences between several different encryption chips?
A: The supported encryption algorithms are different, and the storage space is different.
203. How many times can ATECC608 currently verify signatures per second? Learn about the difference between your chip and the security chip of National Technology
A: It takes about 50 milliseconds to execute a signature algorithm
204. How to encrypt IP for FPGA?
A: Directly use microchip FPGA, which is itself unbreakable!
205. What does this trust platform include? Do you need to use the corresponding microchip chip to achieve it? Are there any complete reference cases?
A: It mainly includes three types of security chip products, trust&go, trustflex and trustcustom, and the development kit designsuite, which can provide evaluation tools and reference codes
206. What is the working power consumption?
A: Maximum 14mA, this is set to the highest operating speed and when performing ECC operations, it returns to idle mode after execution, about 0.8mA207
. Microchip's emulator is not very easy to use. Have you launched a new emulator ?
A: Recently, a new generation of emulators has been launched. PICKIT4, ICD4, etc.208
. What is the smallest package of the encryption chip?
A: The smallest package is SOT-23209
. Does the host computer have relevant configuration and debugging software?
A: Trust Platform has the corresponding host computer software, which can be downloaded from our official website: https://www.microchip.com/design-centers/security-ics/trust-platform 210. If you upgrade on an existing product, will the program be modified to a large extent?
A : It depends on your application requirements. What kind of application scenario do you need ?211. What is the budget for Trust & Go? Take 10PCS as an example. A: For specific prices, you can contact our local sales staff or agents, or refer to the official website quotation212 . If SHA204 is used, what do we need to do? A: Because the application of SHA204 is relatively simple, we have some codes and tools for SHA204, such as ACES and our CryptoAuthen Lib. We also have some ANs to explain how to use them, such as AN8794, AN8841 213. Can you set several keys with different security levels? Different keys have different permissions A: You can set the access rights of the key according to the actual application. Generally speaking, once it is set as a private key, it cannot be accessed and can only be used in a limited way 214. Is it cost-effective to use it for electronic anti-counterfeiting authentication? A: We already have a large number of customers using our solution in anti-cloning applications. We believe in the choice of customers 215. I remember that before the acquisition of Atmel, AT had a storage chip that used two-wire multiplexed power lines for communication. Is the chip still in production after being acquired by Microchip? The model number starts with AT, but I can't remember the specific model A: Microchip also had such products. You can check the official website for details 216. How to strengthen the security protection of Bluetooth applications? How to distinguish between several versions? A: We focus on two points in Bluetooth security: identity recognition, only authorized devices can connect, and data encryption. The authorized device will establish a session key when establishing a secure connection handshake. After the handshake is completed, this key will be used for encrypted communication. Currently, we are mainly focusing on BT4.0.














This post is from Security Electronics
Add and join groups EEWorld service account EEWorld subscription account Automotive development circle

Latest reply

It's pretty complete, but it would be better if there was a tutorial.   Details Published on 2019-12-12 22:14
Personal signature微信搜索公众号“EEWORLDBBS”快去添加关注吧!
 
 

1w

Posts

25

Resources
2
 

It's pretty complete, but it would be better if there was a tutorial.

This post is from Security Electronics
 
 
 

Guess Your Favourite
Just looking around
Find a datasheet?

EEWorld Datasheet Technical Support

Copyright © 2005-2024 EEWORLD.com.cn, Inc. All rights reserved 京B2-20211791 京ICP备10001474号-1 电信业务审批[2006]字第258号函 京公网安备 11010802033920号
快速回复 返回顶部 Return list