Announcements

Help us improve the Power & Sensing Selection Guide. Share feedback

Tip / Sign in to post questions, reply, level up, and achieve exciting badges. Know more

cross mob
User19218
Level 2
Level 2
10 replies posted 5 replies posted 5 questions asked
If devices want to its secret key to be updated periodically by the management of cloud, how it realize? On the CAN bus it may need to be encrypted, when the data enter into microcontroller, how it work to change original secret key?
0 Likes
2 Replies
NeMa_4793301
Level 6
Level 6
10 likes received 10 solutions authored 5 solutions authored
The HSM gives you a secure CPU with private data storage and hardware accelerators for various cryptographic algorithms. This flexible hardware approach leaves the implementation up to software.

Get in touch with Infineon's software partners to see what solutions are available:
https://www.infineon.com/cms/en/product/microcontroller/32-bit-tricore-microcontroller/aurix-securit...
0 Likes
flexharm23
Level 1
Level 1
First reply posted Welcome!
  1. Access Control: Ensure that only authorized personnel have access to the Hardware Security Module (HSM) to prevent unauthorized key updates.

  2. Authentication: Implement strong authentication measures, such as multi-factor authentication, before allowing any key updates to enhance security.

  3. Secure Channels: Utilize secure communication for r2park channels when updating secret keys on the HSM to prevent interception or tampering. Use protocols like TLS for encrypted communication.

  4. Offline Updates: Consider performing key updates in an offline or isolated environment to minimize the risk of exposure during the update process.

  5. Logging and Auditing: Enable comprehensive logging and auditing features on the HSM to track key update activities, aiding in monitoring and identifying any suspicious actions.

0 Likes