Search found 4 matches

by NStorm
Sat Jan 13, 2024 2:43 am
Forum: ESP-IDF
Topic: NVS partition encryption keys in HMAC mode
Replies: 4
Views: 44545

Re: NVS partition encryption keys in HMAC mode

You definitely need to protect the device against running malicious firmware (->secure boot). I'll definitely add this as a "layer" of security. I just don't want to rely only on that feature, leaving things behind unprotected. Otherwise an attacker could run his own firmware and let it brute-force...
by NStorm
Tue Jan 09, 2024 6:06 am
Forum: ESP-IDF
Topic: NVS partition encryption keys in HMAC mode
Replies: 4
Views: 44545

Re: NVS partition encryption keys in HMAC mode

Hello @ESP_harshal, If you do not enable secure boot, and even if you somehow read-protect the NVS encryption key (maybe by storing the encryption key directly in the efuses like the read-protected flash encryption key), the "other app" which has been flashed can still decrypt the NVS and get plaint...
by NStorm
Thu Dec 28, 2023 11:18 am
Forum: ESP-IDF
Topic: NVS partition encryption keys in HMAC mode
Replies: 4
Views: 44545

NVS partition encryption keys in HMAC mode

I don't really completely understand how it works on ESP32-C3. Things that clear to me: 1. HMAC are used as a KDF to securely derive AES encryption key, which are used to encrypt/decrypt data on NVS partition. 2. The key for HMAC are stored in eFuse, read protected. Ok, but HMAC also takes 'message'...
by NStorm
Thu Dec 28, 2023 10:30 am
Forum: ESP-IDF
Topic: Using read protected AES keys from application code
Replies: 9
Views: 6036

Re: Using read protected AES keys from application code

In downstream mode (configurable by eFuse), the HMAC->AES key path also is protected, as in the CPU can access neither the eFuses with the original key material nor the derived AES key. It's an old post, but this sentance got my attention. Could you please confirm this and specify ESP32 part which ...