Skip to content

Commit ccacd5c

Browse files
committed
Move device_key into drivers
1 parent 327fe53 commit ccacd5c

File tree

6 files changed

+4
-4
lines changed

6 files changed

+4
-4
lines changed

docs/design-documents/features/storage/SecureStore/SecureStore_design.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@
3232

3333
### Overview and background
3434

35-
SecureStore is a [KVStore](../KVStore/KVStore_design.md) based storage solution, providing security features on the stored data, such as encryption, authentication, rollback protection and write once, over an underlying KVStore class. It references an additional KVStore class for storing the rollback protection keys.
35+
SecureStore is a [KVStore](../KVStore/KVStore_design.md) based storage solution, providing security features on the stored data, such as encryption, authentication, rollback protection and write once, over an underlying KVStore class. It references an additional KVStore class for storing the rollback protection keys.
3636

3737
### Requirements and assumptions
3838

@@ -44,13 +44,13 @@ SecureStore assumes that the underlying KVStore instances are instantiated and i
4444

4545
SecureStore is a storage class, derived from KVStore. It adds security features to the underlying key value store.
4646

47-
As such, it offers all KVStore APIs, with additional security options (which can be selected using the creation flags at set). These include:
47+
As such, it offers all KVStore APIs, with additional security options (which can be selected using the creation flags at set). These include:
4848

49-
- Encryption: Data is encrypted using the AES-CTR encryption method, with a randomly generated 8-byte IV. Key is derived from [Device Key](../../../../../../mbed-os/features/device_key/README.md), using the NIST SP 800-108 KDF in counter mode spec, where salt is the key trimmed to 32 bytes, with "ENC" as prefix. Flag here is called "require confidentiality flag".
49+
- Encryption: Data is encrypted using the AES-CTR encryption method, with a randomly generated 8-byte IV. Key is derived from [Device Key](../../../../../../mbed-os/drivers/device_key/README.md), using the NIST SP 800-108 KDF in counter mode spec, where salt is the key trimmed to 32 bytes, with "ENC" as prefix. Flag here is called "require confidentiality flag".
5050
- Rollback protection: (Requires authentication) CMAC is stored in a designated rollback protected storage (also of KVStore type) and compared to when reading the data under the same KVStore key. A missing or different key in the rollback protected storage results in an error. The flag here is called "Require replay protection flag".
5151
- Write once: Key can only be stored once and can't be removed. The flag here is called "Write once flag".
5252

53-
SecureStore maintains data integrity using a record CMAC. This 16-byte CMAC is calculated on all stored data (including key & metadata) and stored at the end of the record. When reading the record, SecureStore compares the calculated CMAC with the stored one. In the case of encryption, CMAC is calculated on the encrypted data. The key used for generating the CMAC is derived from [Device Key](../../../../../../mbed-os/features/device_key/README.md), where salt is the key trimmed to 32 bytes, with "AUTH" as prefix.
53+
SecureStore maintains data integrity using a record CMAC. This 16-byte CMAC is calculated on all stored data (including key & metadata) and stored at the end of the record. When reading the record, SecureStore compares the calculated CMAC with the stored one. In the case of encryption, CMAC is calculated on the encrypted data. The key used for generating the CMAC is derived from [Device Key](../../../../../../mbed-os/drivers/device_key/README.md), where salt is the key trimmed to 32 bytes, with "AUTH" as prefix.
5454

5555
![SecureStore Layers](./SecureStore_layers.jpg)
5656

File renamed without changes.
File renamed without changes.

0 commit comments

Comments
 (0)