2 Terms

  • Asymmetric/Public Cryptography – A pair of cryptographically linked keys, commonly called a key pair, are used for cryptographic operations where one key is private and the other is public. One party in the cryptographic operation has the private key typically, and its secrecy is critical. The public key is not a secret.
  • Digest – The output of a hash function.
  • First Mutable Code – The first code that runs in the system and has the capability of being updated.
  • Hash – A function that takes in variable length data and produces a fixed length output (digest) that represents the identify of that data. Cryptographic hashes have additional requirements, such as collision resistance, irreversibility, avalanching, etc.
  • ICSP™ - In-Circuit Serial Programming™ is the method used to program, read and debug on many Microchip devices.
  • Key Pair – A set of a public and a private key that are cryptographically linked.
  • Key Store – A collection of cryptographic keys, certificates or other data items used for cryptographic/security operations.
  • Mutable Code – Any code in the system that can be updated.
  • RTSP – Run-Time Self-Programming – When firmware/code issues self writes/erases to the memory.
  • Symmetric Cryptography – Cryptographic operations where all parties involved must know the same shared secret/key.
  • Root of Trust – An element that forms the basis of providing one of more security-specific functions, such as measurement, storage, reporting, recovery, verification and update [NIST SP 800-193 3.3].