Overview

Both acronyms indicate the device's functional block that performs the crypto functions requested. For further details on the device see the Hardware Reference Manual.

The reader should understand that the design of this driver is a legacy holdover from two prior generations of security processors. As applications have already been written for those processors, certain aspects of the interface for this driver have been designed so as to maintain source-level application portability with prior driver/processor versions. Where relevant in this document, prior-version compatibility features will be indicated to the reader.

Table 1 contains acronyms and abbreviations that are used in this user’s guide.

 

 

Table 1. Acronyms and Abbreviations

 

 

 

 

 

 

 

 

Term

Meaning

 

 

 

 

 

 

 

AESA

AES accelerator—This term is synonymous with AESU in the MPC18x User’s Manual and other

 

 

 

documentation.

 

 

 

 

 

 

 

AFHA

ARC-4 hardware accelerator—This term is synonymous with AFEU in the MPC18x User’s Manual

 

 

 

and other documentation.

 

 

 

 

 

 

 

APAD

Autopad—The MDHA will automatically pad incomplete message blocks out to 512 bits when APAD

 

 

 

is enabled.

 

 

 

 

 

 

 

ARC-4

Encryption algorithm compatible with the RC-4 algorithm developed by RSA, Inc.

 

 

 

 

 

 

 

Auth

Authentication

 

 

 

 

 

 

 

CBC

Cipher block chaining—An encryption mode commonly used with block ciphers.

 

 

 

 

 

 

CHA

Crypto hardware accelerator—This term is synonymous with ‘execution unit’ in the MPC18x User’s

 

 

 

Manual and other documentation.

 

 

 

 

 

 

 

 

CTX

Context

 

 

 

 

 

 

 

DESA

DES accelerator—This term is synonymous with DEU in the MPC18x User’s Manual and other

 

 

 

documentation.

 

 

 

 

 

 

 

 

DPD

Data packet descriptor

 

 

 

 

 

 

 

ECB

Electronic code book—An encryption mode less commonly used with block ciphers.

 

 

 

 

 

 

 

EU

Execution unit

 

 

 

 

 

 

 

 

HMAC

Hashed message authentication code

 

 

 

 

 

 

 

 

IDGS

Initialize digest

 

 

 

 

 

 

 

 

IPSec

Internet protocol security

 

 

 

 

 

 

 

 

ISR

Interrupt service routine

 

 

 

 

 

 

 

 

KEA

Kasumi encryption acceleration

 

 

 

 

 

 

 

 

MD

Message digest

 

 

 

 

 

 

 

MDHA

Message digest hardware accelerator—This term is synonymous with MDEU in the MPC18x User’s

 

 

 

Manual and other documentation.

 

 

 

 

 

 

 

 

OS

Operating system

 

 

 

 

 

 

 

 

PK

Public key

 

 

 

 

 

 

 

PKHA

Public key hardware accelerator—This term is synonymous with PKEU in the MPC18x User’s

 

 

 

Manual and other documentation.

 

 

 

 

 

 

 

 

 

SEC 2.0 Reference Device Driver User’s Guide, Rev. 0

 

 

 

 

 

 

 

2

 

PRELIMINARY—SUBJECT TO CHANGE WITHOUT NOTICE

Freescale Semiconductor

Page 2
Image 2
Freescale Semiconductor SEC2SWUG specifications Acronyms and Abbreviations, Overview, Term Meaning

SEC2SWUG specifications

Freescale Semiconductor, a prominent player in the semiconductor industry, has made significant strides in developing robust solutions tailored for the automotive and industrial sectors. One such innovation is the SEC2SWUG (Security Configuration to Software User Guide), a comprehensive framework designed to enhance security protocols across various applications.

The SEC2SWUG is particularly vital in an era where cybersecurity threats are increasingly sophisticated. This tool is built to help developers implement security measures seamlessly during the software design phase, ensuring products are resilient against potential vulnerabilities. One of the main features of the SEC2SWUG is its versatility; it can be applied across a wide range of microcontrollers and processors offered by Freescale. This is particularly advantageous for engineers who require a consistent security approach across different platforms.

In terms of technology, the SEC2SWUG incorporates advanced cryptographic algorithms, allowing for data encryption, decryption, and authentication processes. This ensures that sensitive information remains secure, particularly in automotive applications where vehicle-to-everything (V2X) communication is becoming paramount. Moreover, the guide details the implementation of secure boot processes, which verify the integrity of firmware before it executes, bolstering overall system security.

Another key characteristic of SEC2SWUG is its user-friendliness. Freescale has focused on creating a resource that not only provides theoretical knowledge but also practical guidelines, making it easier for developers to integrate security protocols into their projects. The guide features clear annotations, example code snippets, and troubleshooting tips, which enhance the developer experience and facilitate a smoother transition from concept to execution.

Additionally, SEC2SWUG is designed to be scalable. As industries evolve, the demand for security measures will only grow, and this framework ensures that developers can adapt their solutions accordingly. Whether working on embedded systems, IoT applications, or complex automotive networks, the SEC2SWUG offers a robust security foundation.

In conclusion, Freescale Semiconductor's SEC2SWUG is a vital tool for engineers and developers looking to embed security into their applications. With its focus on advanced technologies and user-centric design, the SEC2SWUG stands at the forefront of secure software development, addressing the critical need for safety in interconnected systems.