Skip to content
I
INOVASENSE
Hardware Security Design: From Secure Elements to Post-Quantum Cryptography - Inovasense
Hardware SecuritySecure ElementTPMPSA CertifiedPost-QuantumCRA

Hardware Security Design: From Secure Elements to Post-Quantum Cryptography

Inovasense Team 6 min read
Hardware Security Design: From Secure Elements to Post-Quantum Cryptography

Hardware security design is the practice of anchoring a device’s trust chain in tamper-resistant silicon — making it physically impossible to extract cryptographic keys, forge firmware signatures, or bypass authentication mechanisms through software attacks alone. Unlike software security (which relies on code correctness), hardware security provides a root of trust that cannot be compromised by vulnerabilities in the application, OS, or network stack.

With the EU Cyber Resilience Act (EU 2024/2847) mandating secure boot, authenticated updates, and vulnerability management for all connected products by December 2027, hardware security is no longer optional — it’s a regulatory requirement.

The Hardware Security Stack

A properly secured embedded device implements security at every layer:

LayerComponentFunctionExample
Root of TrustSecure Element (SE) or TPMTamper-resistant key storage, cryptographic operationsInfineon OPTIGA Trust M (CC EAL6+), NXP SE050
Secure BootFirst-stage bootloader in OTP/protected flashVerifies firmware signature before executionARM TrustZone + Secure Boot ROM
Secure OS PartitionTrustZone Secure World or RISC-V PMPIsolated execution of security-critical codeOP-TEE, TF-M (Trusted Firmware-M)
Cryptographic EngineHardware AES, SHA, ECC acceleratorPerformant crypto without CPU overheadSTM32 CRYP/HASH, ESP32 AES-XTS
Secure StorageEncrypted flash with key derived from SEProtected firmware and configuration dataOTFDEC (on-the-fly decryption)
Secure CommunicationTLS 1.3 with hardware-backed credentialsAuthenticated, encrypted data in transitATECC608B + AWS IoT Core
Secure UpdateDual-bank A/B OTA with rollback protectionAuthenticated firmware updatesMCUboot, SWUpdate

Secure Elements: The Foundation of Hardware Trust

A Secure Element (SE) is a dedicated, tamper-resistant IC designed to store cryptographic keys and perform cryptographic operations in a physically protected environment:

Secure ElementCertificationKey StorageCrypto AlgorithmsInterfacePrice Range
Infineon OPTIGA Trust MCC EAL6+ECC P256/P384, RSA 2048ECDSA, ECDH, SHA-256, TRNGI²C€0.80–1.50
NXP SE050CC EAL6+ECC, RSA, AES, Ed25519ECDSA, ECDH, AES-128/256, SHA-256/384/512I²C€1.00–2.00
Microchip ATECC608BFIPS 140-2 (pending)ECC P256ECDSA, ECDH, SHA-256, AES-128, TRNGI²C€0.50–0.80
STMicro STSAFE-A110CC EAL5+ECC P256/P384ECDSA, ECDH, SHA-256/384, TRNGI²C€0.60–1.00

Why hardware, not software? A cryptographic key stored in MCU flash can be extracted via JTAG/SWD debugging, side-channel attacks (power analysis, electromagnetic emanation), or flash readout. A Secure Element stores keys in a shielded, tamper-detecting environment with active countermeasures — the key literally cannot leave the chip.

PSA Certified: The Industry Security Framework

ARM’s PSA (Platform Security Architecture) Certified framework provides a standardized security certification for MCU-based devices:

LevelWhat It CertifiesLab Evaluation RequiredTypical MCUs
PSA Certified Level 1Security questionnaire, threat model, basic security functionsSelf-assessmentSTM32L5, Nordic nRF5340
PSA Certified Level 2Software attack resistance, secure boot, secure updateIndependent lab (8–12 weeks)STM32U5, NXP LPC55S69
PSA Certified Level 3Hardware attack resistance (fault injection, SCA)Advanced lab (12–16 weeks)STM32H5 + SE, Renesas RZ/G

PSA Certified Level 2 is becoming the minimum expectation for commercial IoT products. It aligns closely with the CRA’s technical requirements and provides a clear compliance argument.

The Secure Boot Chain

A properly implemented secure boot chain prevents any unauthorized code from executing on the device:

1. ROM Bootloader (immutable, burned into silicon)
   ├── Verifies signature of Second-Stage Bootloader
   └── If invalid → HALT (device does not boot)

2. Second-Stage Bootloader (MCUboot / U-Boot)
   ├── Verifies signature of Application Firmware
   ├── Manages A/B firmware slots for OTA updates
   └── If invalid → Rollback to last known-good image

3. Application Firmware
   ├── Runs in Non-Secure World (TrustZone)
   ├── Accesses crypto services via Secure World API
   └── Cannot access Secure Element keys directly

Critical requirement: The first-stage bootloader must be immutable — stored in OTP (One-Time Programmable) memory or ROM. If an attacker can modify the bootloader, the entire security chain collapses.

Post-Quantum Cryptography: Preparing for the Quantum Threat

Current asymmetric cryptography (RSA, ECC, Diffie-Hellman) will be broken by sufficiently powerful quantum computers. NIST finalized the first post-quantum cryptographic standards in 2024:

AlgorithmNIST StandardTypeKey SizePerformance on Cortex-M4
ML-KEM (CRYSTALS-Kyber)FIPS 203Key Encapsulation1,568 bytes (KEM-768)~1 ms encapsulation
ML-DSA (CRYSTALS-Dilithium)FIPS 204Digital Signature2,420 bytes (DSA-65)~3 ms sign, ~1 ms verify
SLH-DSA (SPHINCS+)FIPS 205Digital Signature (stateless)7,856 bytes~50 ms sign

Impact on embedded systems: Post-quantum key sizes and signature sizes are 10–100× larger than ECC equivalents. This affects flash storage (for certificate chains), RAM (for signature verification buffers), and bandwidth (for OTA update signatures). Hardware designers need to plan for these requirements now, even before PQC is mandated.

The recommended approach: hybrid certificates that include both ECC and PQC signatures, ensuring compatibility with current infrastructure while providing quantum resistance.

Common Security Architecture Mistakes

MistakeWhy It’s DangerousCorrect Approach
Shared device credentialsOne compromised device exposes all devicesPer-device unique credentials provisioned during manufacturing
Symmetric-only key exchangeNo forward secrecy, replay attacks possibleECDHE or ML-KEM key exchange for each session
Debug port left enabledJTAG/SWD allows full memory readoutDisable debug in production via option bytes + RDP Level 2
Software-only key storageKeys extractable via flash dump or glitchingHardware SE with tamper detection and active shielding
No firmware rollback protectionAttacker can downgrade to vulnerable versionMonotonic counter in SE/OTP prevents downgrade

Our Security Engineering Approach

At Inovasense, hardware security is an architecture decision made in the requirements phase — not a feature added before certification. We design security from the silicon up:

  1. Threat modeling — STRIDE analysis during system architecture to identify attack surfaces
  2. Security IC selection — Right SE/TPM for the application (cost, certification level, algorithm support)
  3. Secure boot implementation — Immutable bootloader + MCUboot for managed A/B updates
  4. Credential provisioning — Per-device key injection during production using automated HSM workflow
  5. OTA infrastructure — Signed, encrypted firmware delivery with delta updates and rollback protection

All security implementations follow PSA Certified guidelines and are designed for CRA compliance from day one. Contact us to discuss your security architecture.