What is CycurHSM
More and more vehicles are equipped with Internet connectivity, which makes vehicle IT systems increasingly vulnerable to attacks. The system must have a mechanism to prevent unauthorized access by intruders who try to hijack ECU software (such as tuning) or vehicle anti-theft devices (such as immobilizers). We also need to pay attention to the risk of criminals exploiting the vehicle's Internet connection to gain access to the in-vehicle communication system in an attempt to control the behavior of the vehicle.
of ESCRYPT The CycurHSM product is an innovative and flexible HSM security firmware that implements secure ECU boot, secure in-vehicle communication, ECU component protection, and secure flashing.
Product Summary
CycurHSM is a modular solution designed for security, providing extensive and customizable security mechanisms for numerous security applications through numerous open and standardized interfaces. CycurHSM also supports ASIL-D in order to suit all safety-related scenes, and is software that can be easily incorporated into a microcomputer equipped with an HSM (Hardware Security Module).
Features
- ASIL-D, ASPICE (LEVEL2) compliant
- ISO26262 compliant development process
- Supports AUTOSAR/Non-AUTOSAR environments
- Supported MCUs: Infineon, NXP, ST Micro electronics, Renesas, etc.
- Provided as a software stack
- Easily meets OEM-driven security requirements and enables smooth integration into ECUs
- Technical support available in Japan
- With over 100 projects worldwide and installation on over a million vehicles
Encryption and certificate functions
| 暗号化サービス(AES, CMAC, Hashing, Key Derivation, TRNG, PRNG) |
| Cryptographic algorithm for China |
| RSA |
| ECDSA, ECBD, ECDH, ECDHE, EdDSA |
| Key exchange protocol (Diffie–Hellman key exchange) |
| Certificate support |
Field return analysis and HSM debugging
| Fail-Safe HSM Update |
| Secure Host Flashing |
| HSM Debug |
| HSM dump |
| Secure logging |
| HSM-controlled Secure Access (Challenge Response Protocol) |
HSM core functionality and generic features
| Secure storage of data and keys |
| Support for systems with large number of keys (> 100) |
| Component protection (SHE+ support) |
| EEPROM emulation to extend flash endurance |
| HSM RAM mode |
| Multi-core support |
| Preemptive, parallel job processing |
| HSM Lifecycle Mode |
| Secure Boot / Trusted Boot / Authenticated Boot and other boot modes |
| Trust Anchor based on signatures |
| Bank swap SOTA support |
| Memory Unlock (flash password protection) |
| Runtime manipulation detection |
*In order to meet the wide range of requirements of all OEMs, we also support the unique protocols and functions of each OEM, and can also support OEM-specific security requirements.
Inquiry
If you have any questions regarding this product, please contact us using the form below.
ETAS manufacturer information TOP
To return to the ETAS manufacturer information top page, please click below.