SBSFU with STM32 and STSAFE-A100 UM2262
84/94 UM2262 Rev 6
Appendix G SBSFU with STM32 and STSAFE-A100
G.1 Introduction to STSAFE-A100
STSAFE-A100 is a tamper-resistant secure element (HW Common Criteria EAL5+ certified)
used to host X509 certificates and keys, and perform verifications that are used for firmware
image authentication during Secure Boot and Secure Firmware Update procedures.
STSAFE-A100 is connected to STM32 using the I
2
C HW interface. Paring keys must be
provisioned inside STSAFE-A100 and STM32 to secure the system:
• Host_Mac_Key: a symmetric key used to pair a specific STM32 with a specific
STSAFE-A100 in order to prevent product cloning
• Host_Cipher_Key: a symmetric key used to encrypt I
2
C communication between
STM32 and STSAFE-A100 in order to establish a secure communication channel
To combine an STSAFE-A100 with an STM32 for an SBSFU application, cryptographic
scheme X509 certificate-based asymmetric scheme without firmware encryption is used
(refer to
Appendix D Cryptographic schemes handling for more details). This cryptographic
scheme is based on a four-certificate chain principle:
• Root CA Cert: root certificate to be provisioned once inside the STSAFE-A100
• OEM CA Cert: first intermediate certificate from the OEM to be provisioned once inside
the STSAFE-A100
• OEM Divisional CA Cert: second intermediate certificate from the OEM to be inserted
inside the header of each new firmware image
• Firmware Signing Cert: firmware signing certificate from the OEM to be inserted inside
the header of each new firmware image
Figure 49. Certificate chain overview