Storing Keys in Obfuscated Form

Zynq UltraScale+ Device Technical Reference Manual (UG1085)

Document ID
UG1085
Release Date
2023-12-21
Revision
2.4 English

As shown in This Figure, the user key is encrypted with the family key, which is embedded in the metal layers of the device. This family key is the same for all devices in the Zynq UltraScale+ MPSoC family. The result is referred to as the obfuscated key. The term obfuscated is used instead of encrypted to reflect the relative strength of the security mechanism. The obfuscated key can reside in either the authenticated boot header or eFUSEs. During boot, the CSU ROM takes the obfuscated key, decrypts it with the family key, and then uses the resulting user key to decrypt the boot images.

The AMD development tools (bootgen) can be used to create a boot image with the obfuscated key. The family key is not distributed with the AMD development tools. To receive the family key, contact amd.com. For more information on generating boot images with the obfuscated key, see “Chapter 8: Security Features” in the Zynq UltraScale+ MPSoC Software Developer’s Guide (UG1137) [Ref 3].

Figure 12-4:      Obfuscated Key

X-Ref Target - Figure 12-4

X18021-security.jpg