Skip to content

feat(esp_encrypted_img): adds support for ECIES HMAC seeds generation within the device @ boot sequence (IEC-309) #513

@g-380

Description

@g-380

Is your feature request related to a problem?

Hello,

The current design assume that the device hmac key must be securely provisioned onto the device by burning it into an eFuse key block, before it is later used by compute_ecc_key_with_hmac(..) to get the private key ready for use.

To resolve the best secure path for the HMAC key not being exposed during injection, you may consider having the device generating the hmac key itself when bootstraping, after application has been verified (as an example)
Could be using IDF random librairies by enabling an entropy source for RNG, if RF subsystem is disabled ?

Thanks for your support

Describe the solution you'd like.

No response

Describe alternatives you've considered.

No response

Additional context.

No response

Metadata

Metadata

Assignees

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions