
Secure Boot with i.MX28 HAB Version 4, Rev. 1
6 Freescale Semiconductor
i.MX28 security architecture overview
Figure 1. Secure boot flow from device
2.3 HAB Public Key Infrastructure
HAB authentication is based on public key cryptography using the RSA algorithm in which image data is
signed offline using a series of private keys. The resulting signed image data then is verified on i.MX28
using the corresponding public keys. This key structure is known as a Public Key Infrastructure (PKI) tree.
Comentarios a estos manuales