Hi bin4ry,
Sorry for the delay in answering.
On Mon, 30 Sep 2013 09:51:54 +0200, bin4ry <0xbin...@gmail.com> wrote:
> Hi Albert,
>
> so if I get you right the workflow for payload authentication is the
> following:
>
> Encryption process:
(you really should not talk about "encryption process"
Am 13.09.2013 19:28, schrieb Michael Trimarchi:
> Hi
> I don't understand you can decrypt it after load. Why just verify the
> signature?
>
> Michael
>
This is a proof-of-concept for a technique, which involves
de-/encrypting the u-boot.img with a key derived from a hardware
fingerprint. This is
Hi Albert,
so if I get you right the workflow for payload authentication is the
following:
Encryption process:
1. Create hash value H for u-boot.img
2. Encrypt the hash value H with secret K to get encrypted hash values H_enc
3. Store H_enc
Decryption process:
1. Read H_enc
2. Decrypt H_enc us
Hi bin4ry,
On Fri, 13 Sep 2013 16:57:20 +0200, bin4ry <0xbin...@gmail.com> wrote:
> Hi everyone,
>
> I want to implement a minimal secure boot architecture into u-boot by
> letting the u-boot.img be decrypted during SPL execution. Thus, the
> u-boot.img is present on the MMC in an encrypted vers
Hi
On Fri, Sep 13, 2013 at 4:57 PM, bin4ry <0xbin...@gmail.com> wrote:
> Hi everyone,
>
> I want to implement a minimal secure boot architecture into u-boot by
> letting the u-boot.img be decrypted during SPL execution. Thus, the
> u-boot.img is present on the MMC in an encrypted version. I alread
Hi everyone,
I want to implement a minimal secure boot architecture into u-boot by
letting the u-boot.img be decrypted during SPL execution. Thus, the
u-boot.img is present on the MMC in an encrypted version. I already
implemented a basic AES-128 en-/decryption algorithm into the SPL.
Everything
6 matches
Mail list logo