<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>encryption of application code</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/14713/encryption-of-application-code</link><description>Hi, 
 I wish to encrypt my application to protect my code. I&amp;#39;ve tried running my hex file through openssl 
 openssl enc -aes-128-ofb -nopad -nosalt -e -K XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX -iv XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX -in app_release.hex -out</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Tue, 05 Jul 2016 12:19:22 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/14713/encryption-of-application-code" /><item><title>RE: encryption of application code</title><link>https://devzone.nordicsemi.com/thread/56138?ContentTypeID=1</link><pubDate>Tue, 05 Jul 2016 12:19:22 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:be27e2ff-56ce-4c24-914e-20f5a374b2c6</guid><dc:creator>John</dc:creator><description>&lt;p&gt;Interesting. I wasn&amp;#39;t aware of that Android capability. I get why as a developer that would be really handy, but that sure is a security nightmare. As long as the attacker had that sniffer enabled when the devices paired, then yes I believe the encryption could be defeated.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: encryption of application code</title><link>https://devzone.nordicsemi.com/thread/56137?ContentTypeID=1</link><pubDate>Fri, 01 Jul 2016 22:22:07 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:1d7c333d-2d1a-4ea9-9772-3ae349229a79</guid><dc:creator>babaly</dc:creator><description>&lt;p&gt;It seems you forget about a trivial option on Android systems, a hacker can sniff his own Bluetooth traffic easily by enabling Bluetooth HCI Snoop Log and if your firmware is not encrypted it can be stolen during a firmware upgrade process. I think BLE security options don&amp;#39;t help in this case but please correct me if I&amp;#39;m wrong.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: encryption of application code</title><link>https://devzone.nordicsemi.com/thread/56136?ContentTypeID=1</link><pubDate>Thu, 23 Jun 2016 16:01:46 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:8b0599c3-04a0-4c00-9d35-7dd46ef657d6</guid><dc:creator>mstrouse</dc:creator><description>&lt;p&gt;Consider &amp;quot;scrambling&amp;quot; the binary before you generate your hex file. In doing what you are currently doing, you are scrambling the hex file header(s) and trailer(s). And after that, nothing can make sense of it.&lt;/p&gt;
&lt;p&gt;I agree with John tho ... look into BLE security options before you spend a lot more time on this.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: encryption of application code</title><link>https://devzone.nordicsemi.com/thread/56135?ContentTypeID=1</link><pubDate>Thu, 23 Jun 2016 12:45:45 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:9a23f4e8-b41d-4529-90e3-573e8598b89c</guid><dc:creator>John</dc:creator><description>&lt;p&gt;Then you should look at the BLE pairing and security options. The latest bootloader is set up to be able to share pairing information with your application firmware so you can preserve an encrypted connection between your devices when in bootloader mode. Scrambling the hex file is not going to work.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: encryption of application code</title><link>https://devzone.nordicsemi.com/thread/56134?ContentTypeID=1</link><pubDate>Thu, 23 Jun 2016 12:43:23 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:6c7e18e1-622a-4118-ae86-794a947b3369</guid><dc:creator>lee</dc:creator><description>&lt;p&gt;I wish to protect the algorithms in the application hex file on their way to the nrf52 during over the air updates. Not so worried about people reading our code back using a debugger as we&amp;#39;ll be using read back protection.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: encryption of application code</title><link>https://devzone.nordicsemi.com/thread/56133?ContentTypeID=1</link><pubDate>Thu, 23 Jun 2016 12:37:03 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:9297cc1a-adc0-45bd-aa2e-aa283d20c50a</guid><dc:creator>John</dc:creator><description>&lt;p&gt;It is hardly surprising that scrambling your hex file results in a corrupted hex file. If you are looking to protect your application from being reverse engineered I&amp;#39;d look at the read back protection features of the nRF52 instead.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>