Project Description

SMH Technologies introduces a new encryption method of the FlashRunner 2.0 series to enhance the security of its customers’ information

A large amount of data and information is constantly at risk by hacker attacks, especially in the automotive sector. As our vehicles become increasingly connected to the global network, the risk of cyber security breaches increases. While the anti-hacker industry is thriving, there is a constant struggle to keep up with ever-improving technologies.

SMH Technologies is taking this problem into account by introducing an important encryption method to its FlashRunner 2.0 solutions.

Therefore, following the latest market requests, SMH Technologies has developed new security features that will be available for all solutions of the FlashRunner 2.0 series such as:

– FlashRunner 2.0

– FlashRunner High speed

– FlashRunner LAN 2.0 NXG

What do these important features of cyber security consist of?

We have improved the data encryption method from symmetric encryption to asymmetric encryption. The difference between symmetric and asymmetric cryptography is in the number of keys used. Symmetric encryption uses the same key to encrypt and decrypt a given file, while asymmetric encryption uses a pair of keys, using one to encrypt and the other to decrypt. The key used to encrypt is called the public key, while the key to decrypt is called the private key.

How does this method work?

It is very simple. FlashRunner randomly generates a couple of keys. The public key is sent to the host, and it is used by the Workbench to encrypt the data file (FRB), while the private key is securely stored inside the FlashRunner and is used to decrypt the received data.

Which is the main benefit of this method?

This method is much more secure as customers encrypted firmware can only be decrypted by specified FlashRunner devices. What is more, not even SMH Technologies can decrypt a file encrypted with this new method.

How is it possible to integrate this new feature into the production environment?

It is possible to also use this new feature by using the new FRB converter command-line tool. The user can upgrade an encrypted data file using the old method to the new standard. To facilitate integration into the flash sequence, some new methods have been added to the DLL and it is now possible to encrypt both static and dynamic data.

Finally, another very interesting thing: in this update there is the possibility of encrypting even dynamic data such as passwords, keys, etc. using the same encryption method.

Download the latest versions of OS and Workbench from SMH Technologies’ website https://smh-tech.com/support-and-download/system-software/ or send an email to sales@smh-tech.com for any further information.