1. Overview
1.1. Secure Hardware Extension (SHE)
Basic structure: There is a separate secure Zone inside the ECU. Inside Secure Zone is the She module. She contains control Logic, Aes,prng, Memory. She module and CPU communication.
Function:
-Symmetric cryptography, AES-128 with ECB, CBC.
-Secure Key Store
-Secure Boot Loader
-Anthetication
-Against replay attacks
Limit:
-Cannot protect application software
-No Public-key cryptography
-Cannot protect replay attacks
-At the same time only one instance access she
1.2. Hardware Security Module (HSM)
-Symmetric cryptography
-Secure Key Store
-Secure Boot Loader
-Secure Memory
-Implemented within the application CPU ' s ASIC
-Support software modules
EVITA
Limit:
-Need to integrate with normal application CPU in ASIC
SHE vs. HSM
EVITA full > EVITA medium > SHE > EVITA Light
2. Vehicular Security Architectures
Concentration, distribution, mix
Automotive Security's information and experience (3): Vehicular security technology