Infineon and ETAS look to optimise security of next generation MCUs with ESCRYPT CycurHSM

1 min read

With the automotive industry transitioning to software-defined vehicles and new E/E architectures, the demand for high-performance hardware and robust cybersecurity solutions continues to increase.

Credit: Infineon

In response, Infineon Technologies has integrated the ESCRYPT CycurHSM 3.x Automotive Security Software Stack into the AURIX TC4X Cybersecurity Real-time Module (CSRM) in collaboration with ETAS, a provider of automotive software.

With this next-generation solution bundle, ETAS and Infineon said that they were looking to optimise security levels, performance, and functionality.

“One of the strengths of our AURIX offering is the deep level of integration of our partners’ software solutions,” said Thomas Schneid, Senior Director Software, Partnership and Ecosystem Management at Infineon Technologies. Schneid went on to say that by deepening the partnership with ETAS it would help to further advance the development of software-defined vehicles.

Commenting on the announcement Rohan Pandit, Product Manager Onboard Security at ETAS, said, “The integration of the latest version of ESCRYPT CycurHSM with the AURIX microcontroller family will enable software-defined vehicles to meet increasing performance requirements while providing robust security.”

The AURIX TC4x family is compliant with the latest ISO/SAE 21434 cybersecurity standard. The security concept eliminates performance bottlenecks and supports post-quantum cryptography.

The controller family includes a Cybersecurity Real-time Module (CSRM) with dedicated memory and a Cybersecurity Satellite (CSS), which provides accelerators for cryptographic services that can be executed in parallel and significantly improve throughput in conjunction with ESCRYPT CycurHSM 3.x.

In addition, virtualisation support enables the configuration of multiple virtual instances so that several applications can be run in parallel. ESCRYPT CycurHSM 3.x uses this feature to enable flexible boot-up sequences and independent dynamic updates for each virtual instance.

Access control can be configured granularly and individual ASIL levels can be assigned to each virtual instance, enabling different security applications.