Skip to content

usfca/High-Security-Firmware

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 
 
 

Repository files navigation

High-Security-Firmware

A proof-of-concept development in a memory safe language of quantum safe cryptographic security services and infrastructure for secure boot, firmware signing and self attestations.

Shared repo where all code is done:

Quantum Safe Algorithm Repos to Look At

What is a secure boot (for Zoe, Aklile, and Blayde)

  • 3 Min High Level - What is Secure Boot
    • Need to protect computer when booting up
    • Ensures only authorized software can run
  • Paul's Secure Boot Design Example
    • ROM
      • Read-only memory: cannot be updated after manufactures
      • simple minimal setup and authenticates ROM_EXT
      • Contains non updateable public keys used to authenticate ROM_EXT
    • ROM_EXT
      • ROM Extension
      • Another region of read-only memory controlled by Silicon Creator
      • Can be updated after manufactured
      • Checks the signature of next boot stage
    • BL0
      • Bootloader signed by Silicon Owner

Rust Cheat Sheet and Resources for Learning

Implementing Secure Boot:

Building a CLI tool with Rust

Implement a hashing algorithm in Rust as a CLI tool

Implementing Digital Signatures in Rust

Rust cli for hash a file using CLI tool + testing cryptographic algorithms

Rust cli for key generation, key encryption, and wallet

Simple Rust cli for signature verification implementation

About

A proof-of-concept development in a memory safe language of quantum safe cryptographic security services and infrastructure for secure boot, firmware signing and self attestations.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors