Site Search

In-Vehicle Cyber Security Stack for In-Vehicle HSM CycurHSM

What is CycurHSM

More and more vehicles are equipped with Internet connectivity, which makes vehicle IT systems increasingly vulnerable to attacks. The system must have a mechanism to prevent unauthorized access by intruders who try to hijack ECU software (such as tuning) or vehicle anti-theft devices (such as immobilizers). We also need to pay attention to the risk of criminals exploiting the vehicle's Internet connection to gain access to the in-vehicle communication system in an attempt to control the behavior of the vehicle.

of ESCRYPT The CycurHSM product is an innovative and flexible HSM security firmware that implements secure ECU boot, secure in-vehicle communication, ECU component protection, and secure flashing.

Product Summary

CycurHSM is a modular solution designed for security, providing extensive and customizable security mechanisms for numerous security applications through numerous open and standardized interfaces. CycurHSM also supports ASIL-D in order to suit all safety-related scenes, and is software that can be easily incorporated into a microcomputer equipped with an HSM (Hardware Security Module).

Features

  • ASIL-D, ASPICE (LEVEL2) compliant
  • ISO26262 compliant development process
  • Supports AUTOSAR/Non-AUTOSAR environments
  • Supported MCUs: Infineon, NXP, ST Micro electronics, Renesas, etc.
  • Provided as a software stack
  • Easily meets OEM-driven security requirements and enables smooth integration into ECUs
  • Technical support available in Japan
  • With over 100 projects worldwide and installation on over a million vehicles

Encryption and certificate functions

暗号化サービス(AES, CMAC, Hashing, Key Derivation, TRNG, PRNG)
Cryptographic algorithm for China
RSA
ECDSA, ECBD, ECDH, ECDHE, EdDSA
Key exchange protocol (Diffie–Hellman key exchange)
Certificate support

Field return analysis and HSM debugging

Fail-Safe HSM Update
Secure Host Flashing
HSM Debug
HSM dump
Secure logging
HSM-controlled Secure Access (Challenge Response Protocol)

HSM core functionality and generic features

Secure storage of data and keys
Support for systems with large number of keys (> 100)
Component protection (SHE+ support)
EEPROM emulation to extend flash endurance
HSM RAM mode
Multi-core support
Preemptive, parallel job processing
HSM Lifecycle Mode
Secure Boot / Trusted Boot / Authenticated Boot and other boot modes
Trust Anchor based on signatures
Bank swap SOTA support
Memory Unlock (flash password protection)
Runtime manipulation detection

*In order to meet the wide range of requirements of all OEMs, we also support the unique protocols and functions of each OEM, and can also support OEM-specific security requirements.

Inquiry

If you have any questions regarding this product, please contact us using the form below.

ETAS manufacturer information TOP

To return to the ETAS manufacturer information top page, please click below.