Asymmetric/Public Cryptography – A pair of
cryptographically linked keys, commonly called a key pair, are used for cryptographic
operations where one key is private and the other is public. One party in the cryptographic
operation has the private key typically, and its secrecy is critical. The public key is not
a secret.
Digest – The output of a hash function.
First Mutable Code – The first code that runs in
the system and has the capability of being updated.
Hash – A function that takes in variable length
data and produces a fixed length output (digest) that represents the identify of that data.
Cryptographic hashes have additional requirements, such as collision resistance,
irreversibility, avalanching, etc.
ICSP™ - In-Circuit Serial Programming™ is the
method used to program, read and debug on many Microchip devices.
Key Pair – A set of a public and a private key that are cryptographically linked.
Key Store – A collection of cryptographic keys,
certificates or other data items used for cryptographic/security operations.
Mutable Code – Any code in the system that can be updated.
RTSP – Run-Time Self-Programming – When
firmware/code issues self writes/erases to the memory.
Symmetric Cryptography – Cryptographic operations where all parties involved must know the same shared secret/key.
Root of Trust – An element that forms the basis
of providing one of more security-specific
functions, such as measurement, storage,
reporting, recovery, verification and update [NIST
SP 800-193 3.3].
DS70005651A
The online versions of the documents are provided as a courtesy. Verify all content and data in the device’s PDF documentation found on the device product page.