Casablanca M8515-01 Fiche technique

Naviguer en ligne ou télécharger Fiche technique pour Ventilateurs des ménages Casablanca M8515-01. Casablanca M8515-01 Datasheet [en] [fr] Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 24
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 0
AVR230: DES Bootloader
Features
Fits All AVR Microcontrollers with Bootloader Capabilities
Enables Secure Transfer of Compiled Software or Sensitive Data to Any AVR with
Bootloader Capabilities
Includes Easy To Use, Configurable Example Applications
Encrypting Binary Files and Data
Creating Target Bootloaders
Downloading Encrypted Files to Target
Encryption Algorithm Follows Data Encryption Standard (DES)
Triple Data Encryption Standard (3DES) for Increased Security
DES Bootloader Fits Into 2-KB on All AVR Devices
3DES Bootloader Fits Into 2-KB on All AVR Devices, Except ATmega128
Typical Update Times of a 16-KB Application, Including Transfer of Data, Decryption
and Programming of Flash Memory
DES, 115200 Bauds, 16 MHz Target Frequency: 20 Seconds
3DES, 115200 Bauds, 16 MHz Target Frequency: 50 Seconds
Introduction
This application note describes how firmware can be updated securely on AVR micro-
controllers with bootloader capabilities. The method includes using the Data
Encryption Standard (DES) to encrypt the firmware. This application note also sup-
ports the Triple Data Encryption Standard (3DES).
Electronic designs including a microcontroller always need to be equipped with a firm-
ware, be it a portable music player, a hairdryer or a sewing machine. As many
electronic designs evolve rapidly there is a growing need for being able to update
products, which have already been shipped or sold. It may prove difficult to make
changes to the hardware, especially if the product has already reached the end cus-
tomer. But the firmware can easily be updated on products based on Flash
microcontrollers, such as the AVR family.
Many AVR microcontrollers are configured such that it is possible to create a boot-
loader able to receive firmware updates and to reprogram the Flash memory on
demand. The program memory space is divided in two sections: the Bootloader Sec-
tion (BLS) and the Application Section. Both sections have dedicated lock bits for read
and write protection such that a bootloader code can be secured in the BLS while still
being able to update the code in the application area. Hence, the update algorithm in
the BLS can easily be secured against outside access.
The problem remains with the firmware, which typically is not secured before it has
been programmed into Flash memory and lock bits have been set. This means that if
the firmware needs to be updated in the field, it will be open for unauthorized access
from the moment it leaves the programming bench or manufacturer’s premises.
Rev. 2541D–AVR–04/05
8-bit
Microcontroller
Application Note
Vue de la page 0
1 2 3 4 5 6 ... 23 24

Résumé du contenu

Page 1 - Application Note

AVR230: DES BootloaderFeatures• Fits All AVR Microcontrollers with Bootloader Capabilities• Enables Secure Transfer of Compiled Software or Sensitive

Page 2

10AVR230 App Note2541D–AVR–04/05PC Application – GenTempThis application note includes a small PC application, which will generate a template forthe c

Page 3

11AVR230 App Note2541D–AVR–04/05Command Line Arguments The application accepts the following command line arguments.First Run In the first run, typica

Page 4

12AVR230 App Note2541D–AVR–04/05Figure 6. Program Flow of PC ApplicationCommandLine Args?OTHERNONECreateRead Configuration FileGive InstructionsHow M

Page 5

13AVR230 App Note2541D–AVR–04/05The Encrypted File The Flash and EEPROM file are encrypted and stored in one target file. Before encryp-tion, however,

Page 6

14AVR230 App Note2541D–AVR–04/05Figure 8. Creating the Encrypted FileThe steps are described below (numbers refer to Figure 8).1. Data is formatted i

Page 7

15AVR230 App Note2541D–AVR–04/05Figure 9. Program Flow of AVR BootloaderSwitch SW7Pressed?YESNOBootldrLoad Initial Vector for CBCCalculate CRC of App

Page 8

16AVR230 App Note2541D–AVR–04/05Key and Header Files Before the bootloader can be compiled, there are some parameters that need to be setup. To start

Page 9

17AVR230 App Note2541D–AVR–04/05The following table summarizes some of the compiler options for currently supportedAVR devices. Please note that bootl

Page 10 - AVR230 App Note

18AVR230 App Note2541D–AVR–04/05• Oscillator options. The oscillator fuse bits are device dependent. They may require configuration (affects USART).No

Page 11

19AVR230 App Note2541D–AVR–04/05Figure 10. Program Flow of Update ApplicationThe Update application reads in files generated with the Create applicat

Page 12

2AVR230 App Note2541D–AVR–04/05This application note shows how data to be transferred to Flash and EEPROM memo-ries can be secured at all times by usi

Page 13

20AVR230 App Note2541D–AVR–04/05The update application is run from the command prompt. The command prompt argu-ments are listed in Table 11.It should

Page 14

21AVR230 App Note2541D–AVR–04/05For single-key DES, the overall time can be estimated using the following equation.…where FS is the filesize in bytes,

Page 15

22AVR230 App Note2541D–AVR–04/05Summary This application note has presented a method for transferring data securely to an AVRmicrocontroller with boot

Page 16

23AVR230 App Note2541D–AVR–04/05References [1] Douglas Stinson:Cryptography: Theory and Practice,CRC Press, second edition, 1996[2] Electronic Frontie

Page 17

Printed on recycled paper.2541D–AVR–04/05Disclaimer: The information in this document is provided in connection with Atmel products. No license, expr

Page 18

3AVR230 App Note2541D–AVR–04/05application and programming it into Flash memory, while keys are required fordecrypting the incoming data. Lock bits ar

Page 19

4AVR230 App Note2541D–AVR–04/05The DES algorithm uses a 56-bit encryption key, meaning that the number of possiblekey combinations is:DES is a block c

Page 20

5AVR230 App Note2541D–AVR–04/05using a different subset (Kn) of the encryption key (only steps 1, 2 and 16 are illustratedin Figure 2). Finally, the b

Page 21

6AVR230 App Note2541D–AVR–04/05Figure 4. The Decryption Flow According to the 3DES AlgorithmThe following keying options are defined in the standard.

Page 22

7AVR230 App Note2541D–AVR–04/05attacks, the computing power required to break the key increases exponentially with thelength of the key. Since the ave

Page 23

8AVR230 App Note2541D–AVR–04/05Are there any assumptions that can be made on what cleartext data will look like? Inorder for DES to be broken by brute

Page 24 - Regional Headquarters

9AVR230 App Note2541D–AVR–04/05The procedure is discussed in more details below.Configuration File The configuration file contains a list of parameter

Commentaires sur ces manuels

Pas de commentaire