Re: [U-Boot] AES: Encryption of u-boot.img

2013-10-05 Thread Albert ARIBAUD
Hi bin4ry, Sorry for the delay in answering. On Mon, 30 Sep 2013 09:51:54 +0200, bin4ry <0xbin...@gmail.com> wrote: > Hi Albert, > > so if I get you right the workflow for payload authentication is the > following: > > Encryption process: (you really should not talk about "encryption process"

Re: [U-Boot] AES: Encryption of u-boot.img

2013-09-30 Thread bin4ry
Am 13.09.2013 19:28, schrieb Michael Trimarchi: > Hi > I don't understand you can decrypt it after load. Why just verify the > signature? > > Michael > This is a proof-of-concept for a technique, which involves de-/encrypting the u-boot.img with a key derived from a hardware fingerprint. This is

Re: [U-Boot] AES: Encryption of u-boot.img

2013-09-30 Thread bin4ry
Hi Albert, so if I get you right the workflow for payload authentication is the following: Encryption process: 1. Create hash value H for u-boot.img 2. Encrypt the hash value H with secret K to get encrypted hash values H_enc 3. Store H_enc Decryption process: 1. Read H_enc 2. Decrypt H_enc us

Re: [U-Boot] AES: Encryption of u-boot.img

2013-09-14 Thread Albert ARIBAUD
Hi bin4ry, On Fri, 13 Sep 2013 16:57:20 +0200, bin4ry <0xbin...@gmail.com> wrote: > Hi everyone, > > I want to implement a minimal secure boot architecture into u-boot by > letting the u-boot.img be decrypted during SPL execution. Thus, the > u-boot.img is present on the MMC in an encrypted vers

Re: [U-Boot] AES: Encryption of u-boot.img

2013-09-13 Thread Michael Trimarchi
Hi On Fri, Sep 13, 2013 at 4:57 PM, bin4ry <0xbin...@gmail.com> wrote: > Hi everyone, > > I want to implement a minimal secure boot architecture into u-boot by > letting the u-boot.img be decrypted during SPL execution. Thus, the > u-boot.img is present on the MMC in an encrypted version. I alread

[U-Boot] AES: Encryption of u-boot.img

2013-09-13 Thread bin4ry
Hi everyone, I want to implement a minimal secure boot architecture into u-boot by letting the u-boot.img be decrypted during SPL execution. Thus, the u-boot.img is present on the MMC in an encrypted version. I already implemented a basic AES-128 en-/decryption algorithm into the SPL. Everything