SLUSFQ1A December 2024 – December 2024 BQ41Z90
ADVANCE INFORMATION
Refer to the PDF data sheet for device specific package drawings
For robust battery pack security, the BQ41Z90 offers Elliptic Curve Cryptographic (ECC) authentication. ECC authentication uses unique asymmetrical private/public key cryptography, eliminating the requirement of sharing the same secret in the host system.
The ECC authentication protocol in the BQ41Z90 device is the Elliptic Curve Korean Certificate-based Digital Signature Algorithm (EC-KCDSA), implemented based on the International Organization for Standardization (ISO) specification, 14888-3. The EC-KCDSA signature (that is, response from a challenge) is calculated based on the B-163 or B-233 pseudo-random elliptic curve that is standardized and freely available from the National Institute of Standards and Technology (NIST) in the publication FIPS 186-3. Elliptic curve parameters based on B-163 or B-233 will be hard coded into the Mask ROM since these need not be modified.
For reference, see http://csrc.nist.gov/publications/PubsFIPS.html.
The BQ41Z90 includes a hardware-based binary field accelerator peripheral for enhanced performance of the ROM-based EC-KCDSA library functions. The accelerator handles the computation of all binary field additions and multiplications directly in hardware, which allows computations to be done in parallel with other CPU tasks, significantly improving the overall speed of the EC-KCDSA implementation. The top-level EC-KCDSA signature generation protocol is handled in the Mask ROM and uses computation results acquired from the math accelerator to construct the final authentication signature that is provided to the host system via the device serial interface.
The private key and public key can be programmed and stored in physically secure memory that is isolated from Program FLASH, preventing attempts to access or read out its value over the serial interface.
The key pair generation occurs externally so the host system will need knowledge of the public key prior to requesting a signature from the BQ41Z90 device. Similar to SHA-1 authentication, a random challenge must be constructed by the system host and sent to the BQ41Z90 prior to initiating signature generation. From there, the Mask ROM handles execution of all tasks required to communicate with the integrated math accelerator and CPU before making the final result available to the Program FLASH via library function calls.