Analog.com Analog Dialogue Wiki English 简体中文
EngineerZone
EngineerZone
  • Log In
  • Site
  • Search
  • User
  • Support

    Popular Forums

    • RF and Microwave
    • Power Management
    • Video
    • FPGA Reference Designs
    • Precision ADCs
    • Linux Software Drivers
    • SigmaDSP Processors & SigmaStudio Dev. Tool

    Product Forums

    • A2B
    • Amplifiers
    • Analog Microcontrollers
    • Clock and Timing
    • Data Converters
    • Direct Digital Synthesis (DDS)
    • Energy Monitoring and Metering
    • Interface and Isolation
    • MEMS Inertial Sensors
    • Processors and DSP
    • Switches/Multiplexers
    • Temperature Sensors
    • Voltage References
    View All

    Application Forums

    • Audio
    • Automated Test Equipment (ATE)
    • Condition-Based Monitoring
    • Depth, Perception & Ranging Technologies
    • Embedded Vision Sensing Library
    • Motor Control Hardware Platforms
    • Optical Sensing
    • Precision Technology Signal Chains Library
    • Video
    • Wireless Sensor Networks Reference Library

    Design Center Forums

    • ACE Evaluation Software
    • ADEF System Platforms
    • Design Tools and Calculators
    • FPGA Reference Designs
    • Linux Software Drivers
    • Microcontroller no-OS Drivers
    • Reference Designs
    • Signal Chain Power (SCP)
    • Software Interface Tools
    • System Demonstration Platform (SDP) Support
  • Learn

    Highlighted Webinar

    Multidimensional Simulations of Beamformers and other RF Integrated Circuits in Keysight SystemVue

    Recent Discussions

    • ADALM-PLUTO maximum frequency
    • Issue running built programs on Pluto
    • Activity: Simple Op Amps, For ADALM1000 Fig. 1.3 Buffering example
    • ADALM-PLUTO [NETWORK] vs [USB_ETHERNET]
    • Using buffer size different from 2**n

    Places

    • ADI Education Home
    • ADI Education China
    • ADI Education India
    • ADI Education Philippines
    • StudentZone (Analog Dialogue)
    • Virtual Classroom

    Latest Webinars

    • Multidimensional Simulations of Beamformers and other RF Integrated Circuits in Keysight SystemVue
    • Improve Smart Building Energy Efficiency with Industrial Ethernet Controlled Air Conditioning (HVAC) Systems
    • Sustainable Motion Control Solutions for High Performance Servo Drives
    • Audio Design Solutions for Augmented and Virtual Reality (AR/VR) Glasses
    • Robust Industrial Motor Encoder Signal Chain Solutions
    View All Webinars
  • Community Hub

    Challenge Yourself!

      KCC's Quizzes: AQQ 236 about strange marking on airplane engines
    View All

    Places

    • Community Help
    • Logic Lounge

    Resources

    • EZ Code of Conduct
    • Getting Started Guide
    • ADI: Words Matter
    • Community Help Videos
    View All
  • Blogs

    Highlighted Blogs

    Can LTspice Break Physics?

     

    Crawl, Walk, And Run - The Journey To Create The Phaser

    Latest Blogs

    • Hardware Holds The Key To Making Industrial Systems IEC 62443 Compliant
    • Behind the Scenes of DIYRadio Blogs: An Introduction
    • Empowering Surveillance Cameras To Capture A Scene Without Being Heard
    • Mastering The Metrics Makes Specifying Encoders Simpler
    • Understanding Secret Key Cryptography Without Formulas
    Read All Blogs

    ADI Blogs

    • EZ Spotlight
    • The Engineering Mind
  • Partners

    Electronic Design Services - PartnerZone

    • Boston Engineering
    • Calian, Advanced Technologies
    • Colorado Engineering Inc. (DBA CAES AT&E)
    • Clockworks Signal Processing
    • Epiq Solutions
    • Fidus
    • PalmSens
    • Richardson RFPD
    • Tri-Star Design, Inc.
    • VadaTech
    • Vanteon
    • X-Microwave
    View All
Blackfin Processors
  • Processors and DSP
Blackfin Processors
Documents Generate safe and strong keys: FAQ
  • Forums
  • File Uploads
  • FAQs/Docs
  • Members
  • Tags
  • More
  • Cancel
  • +Documents
  • +.ldf file: FAQ
  • +ADI EZ-Kit: FAQ
  • +ADSP-BF50x: FAQ
  • +ADSP-BF527: FAQ
  • +ADSP-BF537: FAQ
  • +ADSP-BF548: FAQ
  • +ADSP-BF592: FAQ
  • ADSP-BF5xx SPI Full Duplex communication in DMA mode
  • +BF506F: FAQ
  • +BF50xF: FAQ
  • +BF51x: FAQ
  • +BF51xF: FAQ
  • +BF525C: FAQ
  • +BF527: FAQ
  • +BF537: FAQ
  • +BF54x/BF52x USB controller: FAQ
  • BF592: FAQ
  • +BF702: FAQ
  • +Blackfin: FAQ
  • CLI and "Target option Mask interrupts during step" FAQ
  • +External vs. Internal Voltage Regulator: FAQ
  • +EZ-KITs via USB: FAQ
  • Floating point to integer conversion error: FAQ
  • Frame sync operation for Primary and secondary data mode with TFSR: FAQ
  • Generate safe and strong keys: FAQ
  • Global variables for multi cores: FAQ
  • +I2S BUS: FAQ
  • +Lockbox: FAQ
  • +PPI port pins: FAQ
  • +SDP image: FAQ
  • +SDRAM: FAQ
  • SPI example for ADSP-BF592
  • TRU Assembly code for ADSP-BF609
  • +USB VBUS: FAQ
  • USB:: Disabling Double Buffering FAQ
  • +VisualDSP++: FAQ
  • Migrating Legacy BLACKFIN to ADSP-BF60x/70x BLACKFIN+ Processors

Generate safe and strong keys: FAQ

Q:

How do I generate safe and strong keys suitable for use with Lockbox for commercial requirements and product deployment in which sensitive information must be protected?

----------------------

A:
ADI does not directly provide key management services. One recommended approach would be to partner with a 3rd party that has security expertise and experience.


For example, Elliptic http://www.ellipticsemi.com/ is a 3rd party member of the ADI DSP Collaborative that is familiar with the Blackfin processor. They have utilities for key generation and for signing messages.


Another approach may be to download one of the many cryptography libraries available online. Miracl http://www.shamus.ie/ is one such set of libraries. If you use a library, you should make sure that you pick the Koblitz curve and the parameters described in the Blackfin literature (BF54x hardware reference manual and also in the VisualDSP++ Lockbox example).

Often times, these libraries provide usage examples that demonstrate the usage of the library but that should not be used as is. For example, the signature generation and the message signing operations require random number generation. The libraries will often use a pseudo random number generation or will simply use a constant number instead. If you want to use such libraries, you need to make sure that you are using a true random number for the signature generation and for the message signing.


The utility provided to demonstrate security features with the ADI EZ-Kit, ecsgen, is distributed solely for demonstration use and relies on a non-cryptographically robust 9 digit decimal input to seed its internal random number generator. The internal random number generator is NOT truly random.  The internal random number generator is actually implemented as a Marsaglia & Zaman pseudo-random number generator (PRNG). Since there is a 1:1 relationship between the seed and the resulting "random" number, this exposes the private/public key to a brute-force attack by simply generating private/public keys for all 1 billion possible seed values and checking the resulting public keys until you find a match. This exposes the private key!


Conclusions
1) DO NOT USE ecsgen to generate a private key for Blackfin Lockbox unless you replace the PRNG - see item 2).
2) Ideally, I would advise you to use a true Hardware Random Number generator (HRNG) to create the private key. This means that you should NEVER be able to generate the same private key twice.
3) You should verify that the random number you chose for the private key is not possible to obtain from ecsgen2 or from whatever method you choose to use for your key generation.


Recommendations

Use a seed from a true HRNG or a seed of your choosing with acceptable entropy suitable for your application.


The information on this page be understood before use of any of these numbers:
http://www.random.org/randomness/


The following are some of the sources of true random numbers:

http://www.random.org/premium/
http://www.fourmilab.ch/hotbits/
http://random.hd.org/index.html


Whatever the source of the data - It is critical to independently confirm that the data is truly random.

See http://www.random.org/statistics/ for some of these tests that should be duplicated on the data regardless of its source.


Finally - It is important to avoid random numbers that are easily generated or guessed:
ie: lowest, middle and highest 1 Trillion numbers, binary, hex or decimal boundaries, over-represented, repeating or sequential sequenced digits, numbers that represent real items (telephone numbers, birthdays etc.)

This FAQ was generated from the following discussion: Lockbox

  • lockbox
  • blackfin
  • Share
  • History
  • More
  • Cancel
Related
Recommended
Social
Quick Links
  • About ADI
  • ADI Signals+
  • Analog Dialogue
  • Careers
  • Contact us
  • Investor Relations
  • News Room
  • Quality & Reliability
  • Sales & Distribution
  • Incubators
Languages
  • English
  • 简体中文
  • 日本語
Newsletter

Interested in the latest news and articles about ADI products, design tools, training and events? Subscribe today!

Sign Up
Analog Logo
©1995 - 2023 Analog Devices, Inc. All Rights Reserved
沪ICP备09046653号-1
  • Sitemap
  • Legal
  • Privacy & Security
  • Privacy Settings
EngineerZone Uses cookies to ensure you get the best experience in our community. For more information on cookies, please read our Privacy & Security Statement.