This post is older than 2 years and might not be relevant anymore
More Info: Consider searching for newer posts

Cybersecurity features for NRF52 chips

Good day!

I'm interesting in ability to support of some required Cybersecurity features by NRF52832 or/and NRF52840:

  1. Is it possible to fully disable JTAG and/or SWD?
  2. Is it possible to implement Flash protection (from rewriting/erasing/readaback)?
  3. Is it possible to implement secure boot? (encrypted bootloader with CRC checking of flash area)

Thanks in advance!

Regards

Parents Reply Children
  • Hi Garret, 

    I apologize for the late reply. 

    The ARM Cortex M4 on nRF52840 does not have any trusted execution environment like the M33 on the nRF9160. Hence, we have focused on implementing a secure boot chain for the nRF9160 in the nRF Connect SDK based on MCUBoot, see http://developer.nordicsemi.com/nRF_Connect_SDK/doc/latest/mcuboot/index.html

    We do therefore still  not have any sample code showing how to use the CC310 in a "secure boot-like" configuration, i.e. use the root key to verify the application prior to pasing execution to this. 

    The bootloader from the nRF5 SDK already uses the ACL to protect the bootloader upon boot and verifies the CRC of the application before passing execution to the application. Modifying this to use the CC310 should not be too much effort. Note the bootloader will have to write the Root key to the CC310 registers so the root key will then either have to be stored in flash or in an external secure element and then retreived by the bootloader upon boot. 

    Best regards

    Bjørn

Related