This post is older than 2 years and might not be relevant anymore
More Info: Consider searching for newer posts

Which is best candidate out of nrf52840 & nRF52832 for BluetoothMesh n/w for security point of view ?

image description

> This is highlight of difference
> between #nrf52840 & #nRF52832.
> 
> #nRF52840 has additional feature of ARM CryptoCell. 
> 
> Is this make #nRF52840 more secure for
> #IoT or #BluetoothMesh application where security of network is more
> important ?
Parents
  • That's part of the problem I'm afraid;) I don't want to be offensive or disrespectful but that's what I've learned in past 10 years about secure hardware/firmware design: if you don't know what these things mean already then it indicates that you are doing this for the first time. And if you are doing it for the first time then probability that you would do it right is very low. Secure design is not like usual things: you cannot do it "almost" good or "just a little mistake". Almost all mistakes lead to holes and almost every hole makes the whole design flawed. So my point was: if you don't know how ARM Cryptocell works and you hope in getting it from reading of this forum it is very unlikely it would help you to somehow significantly strengthen your FW design in your product. You need to have hardcore practitioners who understand the attacks you are trying to mitigate.

    (1/3)

Reply
  • That's part of the problem I'm afraid;) I don't want to be offensive or disrespectful but that's what I've learned in past 10 years about secure hardware/firmware design: if you don't know what these things mean already then it indicates that you are doing this for the first time. And if you are doing it for the first time then probability that you would do it right is very low. Secure design is not like usual things: you cannot do it "almost" good or "just a little mistake". Almost all mistakes lead to holes and almost every hole makes the whole design flawed. So my point was: if you don't know how ARM Cryptocell works and you hope in getting it from reading of this forum it is very unlikely it would help you to somehow significantly strengthen your FW design in your product. You need to have hardcore practitioners who understand the attacks you are trying to mitigate.

    (1/3)

Children
No Data
Related