Your shopping cart is empty!
PDF Preview
JEDEC Solid State Technology Association, 10/01/2022
Publisher: JEDEC
File Format: PDF
$113.00$227.92
Published:01/10/2022
Pages:48
File Size:1 file , 1.5 MB
Note:This product is unavailable in Russia, Ukraine, Belarus
This standard provides a comprehensive definition of the NOR cryptographic security hardware abstraction layer (HAL). It also provides design guidelines and reference software to reduce design-in overhead and facilitate the second sourcing of secure memory devices. It does not attempt to standardize any other interaction to the NOR device that is not related to cryptographic security functionality within the device.
The API definition and functionality described herein require a baseline of symmetric cryptographic capability within supporting memory devices. This architecture does not preclude asymmetric cryptographic functionality in the general sense but does not address asymmetric functionality at the present time.
As with any cryptosystem rooted with symmetric cryptography, a non-ephemeral symmetric secret (key) must be shared between two parties to ensure intended functionality and should be done in a secure manner. This process, typically called key provisioning, is assumed to have already taken place relative to this standard for the targeted computing platform and secure memory device. As such, this standard assumes that a shared secret (nonvolatile root key) already exists between the host and the secure memory device. Initial nonvolatile (pre-shared) key provisioning between a host and memory device will therefore not be addressed by this standard.
TWO-RESISTOR COMPACT THERMAL MODEL GUIDELINE
$31.00 $62.00
THERMAL TEST ENVIRONMENT MODIFICATIONS FOR MULTICHIP PACKAGES
$29.00 $59.00
FULLY BUFFERED DIMM DESIGN FOR TEST, DESIGN FOR VALIDATION (DFx)
$81.00 $163.00
MEASURING WHISKER GROWTH ON TIN AND TIN ALLOY SURFACE FINISHES
$37.00 $74.00