The NXP i.MX 6UL3 ARM Cortex A7 based CPU integrates comprehensive security features making it ideal for security applications such as access control, eCommerce, mobile POS, etc.
iWave Systems being one of the early adaptors of i.MX6UL supports compact, cost-effective i.MX6UL3 applications processor-based SOM with Linux board support package. The BSP is added with various security features such as Tamper detection, High assurance boot (HAB) and Crypto engine (Differential Power Analysis- DPA with DES algorithm.
Secure Non Volatile Storage(SNVS) logic block in the iMX 6UL3 incorporates tamper detection logic. There are two types of tamper detection’s supported called as external and internal.
External Tamper Detection is a special mechanism provided through a chip pin to signal when the device encounters unauthorized opening or tampering. Inside the chip, the received signal is compared with the desired signal level, once an unequal, tamper event is found. When the desired signal is fixed, it is called passive tamper; when the desired signal level is also toggling with time, it is called active tamper. The chip supports at most 10 passive tamper detection pins, or 5 active tamper pairs alternatively.
Active tamper is used to detect tampering of an on-chip wire mesh. There are 5 active tamper output ports and 10 external tamper inputs. Any combination of active tamper output can be configured to any one of the 10 external tamper inputs in the iMX6UL3 CPU.
The internal tamper detection supports voltage, temperature, and clock monitors as well.
The voltage Monitor monitors the Out Range of Battery Voltage. The allowed battery voltage is from 2.5V (low-trip point) to 3.5V (high-trip point). Hysteresis is 100mV for each trip-point. The tamper will be detected when Voltage Monitor generates an “Out of Range Voltage” violation.
Temperature Monitor has the temperature low trip-point spec at -30°C and high trip-point spec at 115°C. Hysteresis is 5°C for each trip-point. The tamper will be detected when Temperature Monitor generates an “Out of Range Temperature” violation.
The system provides automatic detection of external SRTC clock state and provides an alternative internal clock source when a failure is detected. Clock Tamper detects the following scenarios thus generating tamper:
An always-ON power supply (RTC coin-cell battery) should be present in the system. If the tamper detection feature is enabled by software, then the opening of the tamper contact;
Switches system power ON with a Tamper Detection alarm interrupt asserted (for software reaction)
Activate security-related hardware (e.g. automatic and immediate erasure of the Zeroizable Master Key and deny access and erase secure memory contents)
High Assurance Boot(HAB):
HAB is a high assurance boot feature supported in the system boot ROM, detects and prevents the execution of unauthorized software (malware) during the boot sequence.
HAB protects against unauthorized software by:
HAB incorporates the following features:
HAB is integrated with other security features as follows:
Differential Power Analysis (DPA) with DES algorithm:
DPA is securing a cryptographic algorithm that makes use of a secret key. It encrypts and decrypts the text using the DES algorithm. If there is any mismatch between encrypted and decrypted text, it will display the error message.
The basic differential power analysis attack described here relies on two properties of the DES encryption. The first is the fact that the individual DES S-box outputs produce sensitive data that can be correlated to the power information recorded from the target device. The second fact is that each DES S-box input uses only 6 bits of the 48-bit subkey used for that round, which is low enough that they may be exhaustively searched to the highest correlation.
The purpose of the attack implemented is to retrieve the first round subkey used. Once enough of this subkey is determined, the full key used in the DES encryption can be found by an exhaustive search method.
Go to the following link to see NXP i.MX 6 series CPU based product updates
For further information or enquiries please write to firstname.lastname@example.org or contact our Regional Partners.
Copyright © 2022 iWave Systems Technologies Pvt. Ltd.