Continue to Site

Welcome to EDAboard.com

Welcome to our site! EDAboard.com is an international Electronics Discussion Forum focused on EDA software, circuits, schematics, books, theory, papers, asic, pld, 8051, DSP, Network, RF, Analog Design, PCB, Service Manuals... and a whole lot more! To participate you need to register. Registration is free. Click here to register now.

Software protection on a flash of Motorola 68376 CPU

Status
Not open for further replies.
Re: Software protection

As an expansion to coldfire :

Use the public-key encryption algorithm (you can found it wildly on the net ) one part of the key will be burned on the flash (public part) and the second part will be located on the secured UC combining both part will give the decryption key for the contect of the Flash rom


best

bobi
 

Re: Software protection

bobcat1 said:
Use the public-key encryption algorithm (you can found it wildly on the net ) one part of the key will be burned on the flash (public part) and the second part will be located on the secured UC combining both part will give the decryption key for the contect of the Flash rom
Hmm, and where is decryption routine or decryption hardware?
 

Re: Software protection

Decryption routine and 2nd part of public key will be located on the secure slave controller

the main processor get data from the Flash memory send it to the secure slave controller decrypt it and place it back in ram location

the software can then set a ptr to the ram location and run the the program or part of it (for intance data table) from the new location

best bobi
 

Re: Software protection

bobcat1 said:
the main processor get data from the Flash memory send it to the secure slave controller decrypt it and place it back in ram location
heh, and data between CPU and slave controller is unencrypted??? How about sniff all data exchange between them?
 

Re: Software protection

here is a sample
 

Re: Software protection

hi:elektryk
The encrypted data could change everytime, and need a very long time to repeat, maybe one or two month. It is depent on you encrypt algorithm.
 

Status
Not open for further replies.

Part and Inventory Search

Welcome to EDABoard.com

Sponsor

Back
Top