cancel
Showing results for 
Search instead for 
Did you mean: 

Question from Predictive Maintenance Webinar 29th of April: Question on encryption hardware solutions and importance of secure TRNGs and QRNGs, see details section:

Pasi MYLLYMAKI
ST Employee

1) What are the current encryption hardware solutions based on which are used for designing PdM and CM applications?

2) How important is the use of cryptographically secure TRNGs or QRNGs for industrial IoT applications and what are the current hardware encryption protocols based on?

1 REPLY 1
Vladimir JANOUSEK
ST Employee

STSAFE-A110 give those possibilities as described in the datasheet on st.com:

• Latest generation of highly secure MCUs

– Unique serial number on each die

– CC EAL5+ AVA_VAN5 Common Criteria certified

– Active shield

– Monitoring of environmental parameters

– Protection mechanism against faults

– Protection against side-channel attacks

• Advanced asymmetric cryptography

– Elliptic curve cryptography (ECC) with NIST or Brainpool 256-bit and 384-bit curves

– Elliptic curve digital signature algorithm (ECDSA) with SHA-256 and SHA-384 for digital signature generation and verification

– Elliptic curve Diffie-Hellman (ECDH) for key establishment

• Advanced symmetric cryptography

– Secure operating system with protection against logical and physical attacks

• Secure operating system

– Secure STSAFE-A110 kernel for authentication and data management

– Protection against logical and physical attacks

2) How important is the use of cryptographically secure TRNGs or QRNGs for industrial IoT applications and what are the current hardware encryption protocols based on?

In terms of protocols, the most important is TLS, with ECDH/ECDHE for key agreement and RSA or ECDSA for PKI/certificate signature verification. ECDSA or RSA can be used to authenticate firmware in asymmetric case, and AES-based authenticated encryption can be used in the symmetric case