FAQ's


Home

1) What are Digital Signatures?

Digital signatures in cars act like invisible security seals, safeguarding data like software updates and sensor readings. These unique digital fingerprints verify the data's origin and integrity, preventing tampering and ensuring trust in updates and diagnostics. They're like electronic guardians, keeping your car healthy and secure on the road.

Digital Signature

2) Certificate Authority

Imagine a secure pyramid of trust in the digital world: the three-level chain of certificates. At the top sits the Root CA, the grand emperor, trusted by everyone. Below, Intermediate CAs, the trusted advisors, vouch for other certificates. Finally, at the base, Leaf Certificates act like passports, issued to websites or applications and verified by the CAs above. Each CA signs the certificate below, creating a chain of trust that confirms authenticity and legitimacy.

This multi-layered validation ensures only those approved by the trusted root have access, keeping the digital realm safe and secure.

Certificate Hierarchy

3) File Signing Overview?

To ensure integrity and authenticity, the developer must first create a digital fingerprint of the specified logical block using a hash function. This unique hash value is then attached to the binary image file. The developer subsequently uploads the combined file to a specialized signing portal.

Upon receipt, the signing portal meticulously verifies the uploaded file's integrity by independently calculating a hash value for the entire binary image. This calculated hash is rigorously compared to the original hash provided by the developer.

In addition to hash verification, the signing portal conducts further scrutiny, examining essential software metadata such as version numbers, headers, and rollback identifiers. Once these thorough checks are complete, the signing portal digitally signs the binary image, embedding its signature within the file.

This comprehensive process safeguards the binary image's integrity, authenticity, and trustworthiness, ensuring its suitability for secure deployment and usage. FileStructure

4) Hex- View of Signed File

Hex View

5) What is a rollback attack ?

In the world of cybersecurity, a rollback attack refers to a malicious attempt to manipulate a system's state by reverting it to a previous and potentially vulnerable condition. Imagine it like rewinding time on a computer system software, but for nefarious purposes. A rollback attack, also known as a downgrade attack or version rollback attack, is a malicious attempt to force a computer system or network communication back to a less secure state.