5.4 Cyclic Redundancy Check
Overview
In the CRC16 and CRC32 verification methods, a CRC signature is calculated over the application space. That value is compared to a precalculated CRC value stored at the end of the application hex file. If the calculated signature matches the signature stored in the application header, the application is allowed to launch. This form of verification can detect errors in communication and if the memory has been accidentally erased/overwritten. A CRC verification is not nearly as fast as a checksum, but provides better protection. CRC is also faster at validation than a hashing algorithm, but less secure in terms of memory protection due to the lack of authenticity checks.
Algorithms Used
CRC Value | Hex |
---|---|
Seed | 0xFFFF |
Polynomial | 0x1021 |
XOR | N/A |
CRC Value | Hex |
---|---|
Seed | 0xFFFFFFFF |
Polynomial | 0xEDB88320 |
XOR | 0x00000000 |
Verification Flow
In CRC16 and CRC32 verification, the bootloader has a very similar program flow to the Checksum verification. The only difference is the type of hash used in the calculation.