<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>cryptocell vs infineon optiga trustx platform</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/47381/cryptocell-vs-infineon-optiga-trustx-platform</link><description>Hi all, 
 I am not sure if I am on the right track by comparing CryptoCell &amp;amp; Optiga TrustX Platform but I couldn&amp;#39;t understand the difference exactly. What I understand is they both provide similar functionalities, so why would I need an extra hardware</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Wed, 22 May 2019 12:16:24 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/47381/cryptocell-vs-infineon-optiga-trustx-platform" /><item><title>RE: cryptocell vs infineon optiga trustx platform</title><link>https://devzone.nordicsemi.com/thread/188553?ContentTypeID=1</link><pubDate>Wed, 22 May 2019 12:16:24 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:c76f772a-f425-47ad-8ef9-89c5434264d5</guid><dc:creator>Vidar Berg</dc:creator><description>&lt;p&gt;Hi Vedat,&lt;/p&gt;
&lt;p&gt;We do not have a generic whitepaper on security, unfortunately.&lt;/p&gt;
&lt;p&gt;It should be&amp;nbsp;difficult and costly to hack and reverse engineer the&amp;nbsp;IC even if any side-channel attacks can make&amp;nbsp;it leak information.&amp;nbsp; I&amp;#39;m not a security expert, so my best suggestion is&amp;nbsp;to try to determine a reasonable security level based on the threat level and potential impact. E.g., how likely is it that someone may consider investing the time and&amp;nbsp;money needed to achieve this?&amp;nbsp;If keys&amp;nbsp;are&amp;nbsp;extracted from one device, will the other units become vulnerable? etc.&lt;/p&gt;
[quote userid="75799" url="~/f/nordic-q-a/47381/cryptocell-vs-infineon-optiga-trustx-platform/188185"]Is there any example of ACL and APPROTECT usage with full example of how to enable and disable?[/quote]
&lt;p&gt;We don&amp;#39;t have a full example of this. But readback protection is typically enabled by setting the APPROTECT.PALL field through the programmer (APPROTECT can be set at runtime by the FW if necessary).&lt;/p&gt;
&lt;p&gt;With nrfjprog:&lt;/p&gt;
&lt;p style="padding-left:30px;"&gt;nrfjprog --rbp ALL&lt;/p&gt;
&lt;p&gt;For ACL you&amp;nbsp;either&amp;nbsp;use the&amp;nbsp;HW abstraction layer (\modules\nrfx\hal\nrf_acl.h) or access the ACL registers directly.&amp;nbsp;You may also use our bootloader example as a reference, it uses ACL for flash protection.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: cryptocell vs infineon optiga trustx platform</title><link>https://devzone.nordicsemi.com/thread/188185?ContentTypeID=1</link><pubDate>Tue, 21 May 2019 10:00:13 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:a7521a00-a2f3-4ea2-ad9a-be40054a629d</guid><dc:creator>ozanoner</dc:creator><description>&lt;p&gt;Hi Vidar,&lt;/p&gt;
&lt;p&gt;Thank you for the insight!&lt;/p&gt;
&lt;p&gt;Is there anything else that I need to be aware of as physical attack types like explained &lt;a href="https://en.wikipedia.org/wiki/Side-channel_attack"&gt;here&lt;/a&gt;? Do you have any whitepaper that you can suggest me to read regarding to nrf52840 or any of your products in general which explains security issues?&amp;nbsp;&lt;/p&gt;
&lt;p&gt;So I can lock&amp;nbsp;any flash&amp;nbsp;region by using ACL at the moment of assigning IDs and keys, and then&amp;nbsp;enable access port protection.&amp;nbsp;I don&amp;#39;t know if you have knowledge of&amp;nbsp;802.1AR (Secure Device Identity) standard, but this technique seems to solve this requirement. Is there any example of ACL and APPROTECT usage with full example of how to enable and disable?&lt;/p&gt;
&lt;p&gt;Best wishes,&lt;br /&gt;Vedat&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: cryptocell vs infineon optiga trustx platform</title><link>https://devzone.nordicsemi.com/thread/188100?ContentTypeID=1</link><pubDate>Tue, 21 May 2019 07:20:55 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:dcdb10f9-36ea-417b-a7c6-0c694df65a48</guid><dc:creator>Vidar Berg</dc:creator><description>&lt;p&gt;Hi,&lt;/p&gt;
&lt;p&gt;You&amp;#39;re right in that Cryptocell and Optiga TrustX platform provide similar functionalities. I think the key difference is that TrustX offers tamper proof NVM storage. The nRF52840 is not designed to protect against physical attacks such as decapping of the IC.&lt;/p&gt;
&lt;p&gt;The Cryptocell has secure key slots in a protected always-on domain (secure RAM) to which keys can be written and subsequently used by the Cryptocell core, but never read back. The key must be set in the Cryprtocell&amp;#39;s always-on domain after every reset, so it must reside in flash to be persistent.&amp;nbsp;&amp;nbsp; To protect the keys in the 52840&amp;#39;s flash, you can lock down the debug interface by enabling &lt;a href="https://infocenter.nordicsemi.com/topic/ps_nrf52840/uicr.html?cp=3_0_0_3_4_0_4#register.APPROTECT"&gt;APPROTECT&lt;/a&gt;&amp;nbsp;and use the Access control lists (&lt;a href="https://infocenter.nordicsemi.com/topic/ps_nrf52840/acl.html?cp=3_0_0_5_2"&gt;ACL&lt;/a&gt;) to prevent read access from other parts of the code (can only be unlocked by reset).&lt;/p&gt;
&lt;p&gt;Best regards,&lt;/p&gt;
&lt;p&gt;Vidar&amp;nbsp;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>