element14 Community
element14 Community
    Register Log In
  • Site
  • Search
  • Log In Register
  • About Us
  • Community Hub
    Community Hub
    • What's New on element14
    • Feedback and Support
    • Benefits of Membership
    • Personal Blogs
    • Members Area
    • Achievement Levels
  • Learn
    Learn
    • Ask an Expert
    • eBooks
    • element14 presents
    • Learning Center
    • Tech Spotlight
    • STEM Academy
    • Webinars, Training and Events
    • Learning Groups
  • Technologies
    Technologies
    • 3D Printing
    • FPGA
    • Industrial Automation
    • Internet of Things
    • Power & Energy
    • Sensors
    • Technology Groups
  • Challenges & Projects
    Challenges & Projects
    • Design Challenges
    • element14 presents Projects
    • Project14
    • Arduino Projects
    • Raspberry Pi Projects
    • Project Groups
  • Products
    Products
    • Arduino
    • Avnet Boards Community
    • Dev Tools
    • Manufacturers
    • Multicomp Pro
    • Product Groups
    • Raspberry Pi
    • RoadTests & Reviews
  • Store
    Store
    • Visit Your Store
    • Choose another store...
      • Europe
      •  Austria (German)
      •  Belgium (Dutch, French)
      •  Bulgaria (Bulgarian)
      •  Czech Republic (Czech)
      •  Denmark (Danish)
      •  Estonia (Estonian)
      •  Finland (Finnish)
      •  France (French)
      •  Germany (German)
      •  Hungary (Hungarian)
      •  Ireland
      •  Israel
      •  Italy (Italian)
      •  Latvia (Latvian)
      •  
      •  Lithuania (Lithuanian)
      •  Netherlands (Dutch)
      •  Norway (Norwegian)
      •  Poland (Polish)
      •  Portugal (Portuguese)
      •  Romania (Romanian)
      •  Russia (Russian)
      •  Slovakia (Slovak)
      •  Slovenia (Slovenian)
      •  Spain (Spanish)
      •  Sweden (Swedish)
      •  Switzerland(German, French)
      •  Turkey (Turkish)
      •  United Kingdom
      • Asia Pacific
      •  Australia
      •  China
      •  Hong Kong
      •  India
      •  Korea (Korean)
      •  Malaysia
      •  New Zealand
      •  Philippines
      •  Singapore
      •  Taiwan
      •  Thailand (Thai)
      • Americas
      •  Brazil (Portuguese)
      •  Canada
      •  Mexico (Spanish)
      •  United States
      Can't find the country/region you're looking for? Visit our export site or find a local distributor.
  • Translate
  • Profile
  • Settings
Internet of Things
  • Technologies
  • More
Internet of Things
Forum Where do you store/hide your AES keys used for embedded encypt and decrypt?
  • Blog
  • Forum
  • Documents
  • Quiz
  • Events
  • Polls
  • Members
  • Mentions
  • Sub-Groups
  • Tags
  • More
  • Cancel
  • New
Join Internet of Things to participate - click to join for free!
Actions
  • Share
  • More
  • Cancel
Forum Thread Details
  • State Suggested Answer
  • Replies 36 replies
  • Answers 8 answers
  • Subscribers 507 subscribers
  • Views 11417 views
  • Users 0 members are here
  • aes
  • aes_encryption
  • keystore
  • iot
  • aes_decryption
Related

Where do you store/hide your AES keys used for embedded encypt and decrypt?

Jan Cumps
Jan Cumps over 9 years ago

In a scenario where you have two embedded systems talking to each other,

and you want to encrypt/decrypt the data with AES,

where/how do you store the AES key in your firmware sources?

 

If I put my aes-128-ecb in my source code of my firmware like this:

 

    /* Set up the variables */ 
    uint8_t aesKey[16] = { 
            0x5a, 0x69, 0x67, 0x42, 0x65, 0x65, 0x41, 0x6c, 
            0x6c, 0x69, 0x61, 0x6e, 0x63, 0x65, 0x30, 0x39 
    };

 

 

it's  out there for everyone that has access to the version control system, and can leak to the outside world.

 

What's your approach?

  • Sign in to reply
  • Cancel

Top Replies

  • brianonn
    brianonn over 9 years ago +5 suggested
    Definitely don't check any encryption keys into source control. Let's look at the problem: While programming your APIs you see that you needed an AES key for encrypting your shared link. The problem you…
  • clem57
    clem57 over 9 years ago +2
    I would take the AES 256 bit key and encrypt with a private-public key pair RSA 1024 bit. Public is safe out in the open, but the private is stored on a USB medium on a system with a locked keyring. This…
  • Fred27
    Fred27 over 9 years ago +2 suggested
    Would a "good enough" solution be to have this in a separate file that's ignored by source control? It would in theory be accessible by anyone who could get hold of the firmware, but that would be hard…
  • Former Member
    0 Former Member over 9 years ago in reply to crjeder

    Yes, DIffie Hellman is equivalent to using RSA although some folks might argue about which is more effective.

     

    By using DF or SSL/TLS, I don't ever have to store the working key which is used to actually protect the payloads which are transmitted.  The payload-encryptng key is a random secret.  That is one of the advantages of using a public-private key pair over using only a data encrypting key.

    • Cancel
    • Vote Up 0 Vote Down
    • Sign in to reply
    • Verify Answer
    • Cancel
  • Former Member
    0 Former Member over 9 years ago in reply to Jan Cumps

    Jan Cumps

     

    I realize that you do not have the luxury of someone else administering the devices for you like with IBM zOS ICSF.  So, how secure do you want this IoT to be?  What follows is an idea for "Version 2" of your cc1310 software in a security sense.

     

    My point of view is that I'd rather do some manual work and more programming work (call me a glutton for punishment) in order to protect payloads flying through the air from a man-in-the-middle attack.  I'd also like a secure end to end mutual authentication process based on a CA both ends trust.  Stretch goal: ensure message integrity.

     

    Instead of hard-coding an AES-128 key, you could load Flash with the following during device installation: 

    • Private key (based on DH or RSA ... pick your poison .... OpenSSL seems to be available under TI-RTOS)
    • Trusted CA certificate (I'll only charge you the price of a good ale during a future October in Flanders)

     

    There are a number of public CAs that you could use for signing the end-point certificates.  Someone who understands OpenSSL and the SSL key exchange process could act as your CA using Linux or Microsoft shell scripts for testing this model. 

     

    When an installed device goes into service in a transactional sense and before setting up the first session, a one-time allocate must be done for enough heap in order to allow enough space for the data encryption key information (key data, IV) for each of the maximum number of sessions.  If it is always only one session at a time, then this is overkill.

     

    Net:

    • Extra administrator work for device installation.
    • Extra programming work for device initialization.
    • Extra programming work for partner session set up.
    • No change to programming work for payload protection, except using CBC instead of ECB.
    • Optional: Implement MAC processing of messages at both ends.  A MAC key would get stored in the same place with the data encryption key.

     

    Private key exposure risks:

    • If a device is compromised, that device has to be re-installed with a new public-private key pair (just start over for this one device).
    • Partner devices are not impacted as long as there is no change to CA.
    • Historical payloads are not at risk.
    • Cancel
    • Vote Up +1 Vote Down
    • Sign in to reply
    • Verify Answer
    • Cancel
  • Jan Cumps
    0 Jan Cumps over 9 years ago in reply to Former Member

    Thanks!

     

    I've been dealing with trusted CA certificates - including chasing the signature of our CFO and submitting the board structure of my company to one of those certification authorities (I work for a rather big multinational and by the time I had all doco submitted we didn't need the certificate anymore).

    • Cancel
    • Vote Up 0 Vote Down
    • Sign in to reply
    • Verify Answer
    • Reject Answer
    • Cancel
  • Former Member
    0 Former Member over 9 years ago

    I finally polished up a project so that two of my Asian pals could use it.  Here (https://www.element14.com/community/groups/crypto-security/blog/2016/08/26/do-it-yourself-certificate-authority-on-a-small-single-board-computer) is my IoT security approach with a CA running on a LAN node (E.g. an older Raspberry Pi) during developer testing.  Included in this project are two sample apps, "Alice" (SSL client) and "Bob" (SSL server).  All of the source code is Python and Bash.  It wouldn't be terribly hard to port Alice and Bob to C/C++ since the Python code already uses PyOpenSSL.

    • Cancel
    • Vote Up +1 Vote Down
    • Sign in to reply
    • Verify Answer
    • Cancel
  • Jan Cumps
    0 Jan Cumps over 9 years ago in reply to Former Member

    I tried the link and I'm not allowed to read the article:

    Access to this place or content is restricted. If you think this is a mistake, please contact your administrator or the person who directed you here.

    • Cancel
    • Vote Up 0 Vote Down
    • Sign in to reply
    • Verify Answer
    • Cancel
  • Former Member
    0 Former Member over 9 years ago in reply to Jan Cumps

    Maybe clem57 created the security/crypto group as private somehow?  I doubt if that was intentional.  Anyways, I moved the blog to be under my own login: Do-It-Yourself Certificate Authority on a Raspberry Pi

    Okay now?

    • Cancel
    • Vote Up +1 Vote Down
    • Sign in to reply
    • Verify Answer
    • Cancel
  • Jan Cumps
    0 Jan Cumps over 9 years ago in reply to Former Member

    yes, it's visible now.Thanks

    • Cancel
    • Vote Up 0 Vote Down
    • Sign in to reply
    • Verify Answer
    • Cancel
  • crjeder
    0 crjeder over 8 years ago in reply to Jan Cumps

    You need a certificate YOU trust. IMHO it does not have to be an officially trusted one. So an abandoned PC in your attic not connected to the net may serve as a CA quite well for your purpose.

    • Cancel
    • Vote Up +1 Vote Down
    • Sign in to reply
    • Verify Answer
    • Cancel
  • Jan Cumps
    0 Jan Cumps over 8 years ago in reply to crjeder

    Yes. I agree with that one. I have (non-IoT related) requirements at work for official certificates when we use them for signing particular electronic data exchanges.

    For encrypt and communication we try to use self signed whenever we get away with it.

    • Cancel
    • Vote Up +1 Vote Down
    • Sign in to reply
    • Verify Answer
    • Cancel
  • Jan Cumps
    0 Jan Cumps over 8 years ago

    I just found this service from Maxim: they program the keys in-factory for you:

    PROGRAMMING SECURE AUTHENTICATORS

     

    For end application use these authenticators require programming of keys, data, and device settings. 

    While device evaluation kits provide this capability, Maxim also offers device programming products and services to support high volume needs.

     

     

     

    Secure Factor Pre-Programming

    Our factory pre-programming service securely installs your keys and data after which we ship the parts according to your instructions.

    • Cancel
    • Vote Up 0 Vote Down
    • Sign in to reply
    • Verify Answer
    • Reject Answer
    • Cancel
<>
element14 Community

element14 is the first online community specifically for engineers. Connect with your peers and get expert answers to your questions.

  • Members
  • Learn
  • Technologies
  • Challenges & Projects
  • Products
  • Store
  • About Us
  • Feedback & Support
  • FAQs
  • Terms of Use
  • Privacy Policy
  • Legal and Copyright Notices
  • Sitemap
  • Cookies

An Avnet Company © 2025 Premier Farnell Limited. All Rights Reserved.

Premier Farnell Ltd, registered in England and Wales (no 00876412), registered office: Farnell House, Forge Lane, Leeds LS12 2NE.

ICP 备案号 10220084.

Follow element14

  • X
  • Facebook
  • linkedin
  • YouTube