Information on the module guide itself and the associated resources and known issues are available here.
The Secure Cryptographic Engine (SCE) HAL module is a high-level API for random number generation, digest computing (hash), data encryption and decryption, digital signing and verification. It is implemented on r_sce. The SCE is a dedicated hardware block that can perform cryptography related functions. The functionality provided by the SCE varies across the Synergy MCU Series.
The SCE HAL module configures the cryptographic module, which allows user to build cryptographic protocols for security with the following cryptographic primitives:
- Random-number generation
- Data encryption and decryption using AES or Triple DES (3DES) algorithms
- Signature generation and verification using the RSA or DSA algorithms
- Message-digest computation using HASH algorithms SHA1, SHA224, or SHA256
- Key generation- AES wrapped keys, RSA plain text and wrapped keys
The SCE HAL module guide is targeted for SSP 1.2.0 and above and the SK-S7G2 Kit.
The most recent versions of the SCE HAL module guide application note, application project and import guide are available here.
Module Guide Errata
1) In SSP 1.4.0 additional features were added to the SCE HAL module. This includes new functions for ECC, and Key management. Refer to the SSP 1.4.0 User's Manual Module Overview section for detailed descriptions. The SSP User's Manual is available here.
2) The following description of Key Wrapping is currently missing from the SSP User's Manual module overview. It is included here.
The terms Key Wrapping and Key Installation in the context of SSP are defined as follows:
Key Wrapping: The APIs to generate symmetric keys or asymmetric key pairs on the Synergy platform where the private / secret key is a wrapped key (encrypted key).
Key Installation: User generated private /secret keys on a PC (system outside of the Synergy platform) will be installed (no storage) on the Synergy platform and the wrapped private /secret key returned to the user.
Wrapped keys provide the following advantages:
- The wrapped key can only be used on the Synergy platform (MCU) on which it was generated.
- It cannot be moved to another Synergy platform (MCU).
- Original Key cannot be recovered from the wrapped key.
Module Guide Resources
The following application projects are available from the Renesas web site at the referenced url.
- Getting Started with Cryptography - Application Project here.
- Refer to the SSP release notes for known issues, available here.