Using derived hardware key (DHUK) with AES on stm32u5
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Report Inappropriate Content
‎2023-12-01 10:59 AM
I've been trying to set up the AES peripheral so that it's only using the hardware derived key from the SAES peripheral (without setting any clear text key). However, the only method mentioned in the reference manual on using the DHUK is through the shared-key mode, where a clear text key is encrypted and passed on to AES.
I would like to know if there is a way to use AES with no clear text key (key is entirely hardware generated).
Any insights or alternative approaches would be greatly appreciated.
Solved! Go to Solution.
- Labels:
-
Cryptography
-
STM32 Security
Accepted Solutions
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Report Inappropriate Content
‎2023-12-05 3:39 AM
Hello @jptuser44 and welcome to st community ,
The key provisioning step is needed as the key will be shared between the encryption and decryption sides which can be not on the same hardware so it is not possible as it should be known to both the encryption/decryption sides and this cannot be avoided when using AES .
an alternative is to provision the key in the boot process and use some security features like HDP (hide out protection) to make it unreadable by the application afterwords .
you can check the key management services (KMS MW) which provides this type of solution to provision the and manage cryptographic keys securely
BR
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Report Inappropriate Content
‎2023-12-05 3:39 AM
Hello @jptuser44 and welcome to st community ,
The key provisioning step is needed as the key will be shared between the encryption and decryption sides which can be not on the same hardware so it is not possible as it should be known to both the encryption/decryption sides and this cannot be avoided when using AES .
an alternative is to provision the key in the boot process and use some security features like HDP (hide out protection) to make it unreadable by the application afterwords .
you can check the key management services (KMS MW) which provides this type of solution to provision the and manage cryptographic keys securely
BR
