
Can I obtain information as how secure booting works.How the keys and certificates are generated and also encryption and decryption steps involved in the authentication process. i would like to know just the theory behind it not and commands or technical details. I have attached pictorial representation of 3 consecutive steps involved in secure booting but while I tried to understanding the working though the diagram I felt that authentication might never succeed as no decryption is taking place.Can anyone please inform how the steps are taking place? I have also attached the documentation related to high assurance booting. Thanks in Advance!

Hello JYOTI,
Am 13.02.2014 08:42, schrieb JYOTI DUBEY:
Can I obtain information as how secure booting works.How the keys and certificates are generated and also encryption and decryption steps involved in the authentication process. i would like to know just the theory behind it not and commands or technical details. I have attached pictorial representation of 3 consecutive steps involved in secure booting but while I tried to understanding the working though the diagram I felt that authentication might never succeed as no decryption is taking place.Can anyone please inform how the steps are taking place? I have also attached the documentation related to high assurance booting.
Maybe this 2 documents in the u-boot source help you:
u-boot:doc/uImage.FIT/signature.txt u-boot:doc/uImage.FIT/verified-boot.txt
bye, Heiko

Hi,
On 13 February 2014 00:42, JYOTI DUBEY jyoti0801@gmail.com wrote:
Can I obtain information as how secure booting works.How the keys and certificates are generated and also encryption and decryption steps involved in the authentication process. i would like to know just the theory behind it not and commands or technical details. I have attached pictorial representation of 3 consecutive steps involved in secure booting but while I tried to understanding the working though the diagram I felt that authentication might never succeed as no decryption is taking place.Can anyone please inform how the steps are taking place? I have also attached the documentation related to high assurance booting.
One thing you may have missed in your reading is that secure boot is about authentication rather than encryption. So we sign and verify, rather than encrypt and decrypt.
Regards, Simon
participants (3)
-
Heiko Schocher
-
JYOTI DUBEY
-
Simon Glass