Intelligent connected vehicles are thriving globally, making vehicle networking an important development direction for future automobiles. The cybersecurity issues brought about by networking also exist in connected vehicles, and manufacturers and developers will have to implement high-standard cybersecurity measures in the entire vehicle's electronic and electrical architecture.
In 2009, European car manufacturers such as Audi and BMW released the Security Hardware Extension (SHE) standard. In 2011, some major Tier 1 suppliers and automotive semiconductor companies published HSM hardware specifications based on the SHE specification. In 2016, SAE released SAE J3061, which provides a process framework and guidance for vehicle cybersecurity throughout the entire lifecycle of production, operation, maintenance, and disposal. The upcoming ISO 21434 in 2020 is a standard developed based on SAE J3061 and targets the entire lifecycle of vehicles. It will be a heavyweight standard similar to ISO 26262 for functional safety.
Since the end of 2018, ZC has invested resources in developing cybersecurity-related software and has accumulated rich experience and knowledge in this area.
ZC can develop software libraries that include the core firmware (zHSM CORE) of hardware encryption modules (HSM) and customer application interface functions (SHE CD). The core firmware not only meets the conventional SHE functions (key injection, symmetric encryption and decryption, message authentication code generation and verification, random number generation, and secure boot, etc.), but it can also be extended to support various algorithms, such as HASH and ECC256. The SHE CD interface functions not only meet the requirements of AUTOSAR 4.2.2 but can also be upgraded to higher versions of AUTOSAR 4.4.0, and can even be integrated as a standalone complex driver in non-AUTOSAR environments.
In short, the ZC.MuNiu Cybersecurity Lib is flexibly applicable to all AURIX 2G products, with high extensibility, allowing for upgrades, configuration, and redevelopment according to different customer project requirements, ultimately meeting the cybersecurity needs of various customers.