SPRADO0
November 2024
F29H850TU
,
F29H859TU-Q1
1
Abstract
Trademarks
1
Introduction
2
The Need for a Comprehensive Security Approach
3
Cryptographic Functions
3.1
Encryption and Decryption
3.2
Hashing, Digital Signing, and Authentication
3.3
Random Number Generators (RNGs)
4
Establishing a Root of Trust
4.1
Secure Storage of Secrets
4.2
Preserving Key and Code Security
4.3
Secure Boot
5
Secure Execution Environment
6
Security Countermeasures
7
Debug Security
8
Conclusion
Technical White Paper
Enabling Cybersecurity for High Performance Real-Time Control Systems