Visible to Intel only — GUID: cru1452898147957
Ixiasoft
Visible to Intel only — GUID: cru1452898147957
Ixiasoft
Software Image Authentication and Encryption
To provide the highest level of security during boot, you can apply both signing and encryption to a newly generated second-stage boot loader image. The image must be encrypted first, and then signed, so that the signature is available prior to decryption. During the boot process, the boot ROM firmware first attempts to authenticate the boot loader image. If authentication is successful, the device decrypts and loads the boot loader image.
You can use security settings in the boot loader generator to sign and encrypt a boot loader image.