2020-05-15 05:36 AM
1) What are the current encryption hardware solutions based on which are used for designing PdM and CM applications?
2) How important is the use of cryptographically secure TRNGs or QRNGs for industrial IoT applications and what are the current hardware encryption protocols based on?
2020-05-15 08:01 AM
STSAFE-A110 give those possibilities as described in the datasheet on st.com:
• Latest generation of highly secure MCUs
– Unique serial number on each die
– CC EAL5+ AVA_VAN5 Common Criteria certified
– Active shield
– Monitoring of environmental parameters
– Protection mechanism against faults
– Protection against side-channel attacks
• Advanced asymmetric cryptography
– Elliptic curve cryptography (ECC) with NIST or Brainpool 256-bit and 384-bit curves
– Elliptic curve digital signature algorithm (ECDSA) with SHA-256 and SHA-384 for digital signature generation and verification
– Elliptic curve Diffie-Hellman (ECDH) for key establishment
• Advanced symmetric cryptography
– Secure operating system with protection against logical and physical attacks
• Secure operating system
– Secure STSAFE-A110 kernel for authentication and data management
– Protection against logical and physical attacks
2) How important is the use of cryptographically secure TRNGs or QRNGs for industrial IoT applications and what are the current hardware encryption protocols based on?
In terms of protocols, the most important is TLS, with ECDH/ECDHE for key agreement and RSA or ECDSA for PKI/certificate signature verification. ECDSA or RSA can be used to authenticate firmware in asymmetric case, and AES-based authenticated encryption can be used in the symmetric case