Supplier eBooks

Renesas - Secure Your connected World

Issue link: https://resources.mouser.com/i/1437738

Contents of this Issue

Navigation

Page 13 of 27

Once products are in the field, the secure boot manager can securely update authorized firmware to the Synergy MCUs' flash memory with the on-chip root-of-trust validating and decrypting the firmware before flash programming–all securely provisioned via secure cloud infrastructure made more reliable and trustworthy with Renesas cloud connectivity solutions. Or, if you prefer, select Renesas partners can assist with secure provisioning and programming of solutions and services, and are committed to providing manufacturing security at a reasonable cost. How Can I Manage Security with Less Complexity? Designing in-depth, layered security for embedded designs can be challenging and time-consuming, and one way to reduce the learning curve is to ensure that the latest security advances and protocols are already built-in to the development platform. With the Synergy platform, developers don't have to learn all new and relevant protocols and other security safeguards to produce a secure application. The Synergy Software Package simplifies complex functions encountered while developing secure connected embedded systems. The software secures areas of memory where developers can create and store portions of code that are flash and SRAM read- and write-protected. Doing so allows developers to create customizable areas of memory that can be used to store temporal keys, private keys, and other sensitive data. The Synergy platform supports both public key infrastructure (PKI), a cryptography methodology that offers authentication via digital certificates, and pre-shared key (PSK), an encryption model in which authentication is authorized when both peers in a digital connection specify the same key. PSK offers a simpler form of encryption and can provide appropriate levels of protection for situations such as access control for small numbers of users. Although more complex to initiate and manage, PKI is a form of asymmetric cryptography that can authenticate users, produce and distribute certificates, and maintain, manage, and revoke certificates. PKI, with public and private keys, is usually considered a more secure encryption model and is commonly used for authentication in large encryption systems. | 4 | | 14 | Figure 2: Renesas Synergy Secure Boot Manager provides a secure firmware flash programming solution. (Source: Renesas Electronics Corp.) Renesas Synergy Secure Boot Manager

Articles in this issue

view archives of Supplier eBooks - Renesas - Secure Your connected World