6.4 Security Features
| Peripheral | Function | Description | Comments | 
|---|---|---|---|
| TrustZone | Security Enclave | Partition secure/non-secure world | Arm technology | 
| Cortex MMU | Memory Management Unit | Cortex-A5 Memory Management Unit | – | 
| PIO | I/O Control/ Peripheral Access | When a peripheral is not selected (PIO-controlled), I/O lines have no access to the peripheral. | – | 
| Freeze | Capability to freeze either the functional part or the physical part of the configuration. | Once the freeze command is issued, no modifications to the current configuration are possible. Only a hardware reset allows a change to the configuration. | |
| Classical Advanced Software Crypto LIbrary (CASCL) | Cryptography | Software ECC (Asymmetric key algorithm, elliptic curves) | Software library(1) | 
| Software RSA (Asymmetric key algorithm) | |||
| TDES, TRNG | Hardware-accelerated Triple DES | FIPS-compliant(2) | |
| True Random Number Generator | |||
| AES, SHA | Hardware-accelerated AES up to 256 bits | ||
| SHA up to 512 and HMAC-SHA | |||
| Secure Boot | Code encrypted/decrypted, Trusted Code Authentication | Hardware SHA (HMAC) + Software RSA or AES Hardware (CMAC) | |
| AESB | AES on-the-fly | On-the-fly encryption/decryption for DDR and QSPI memories | AES128 | 
| Memories | Scrambling | On-the-fly scrambling/unscrambling for memories | All internal and external memories such as QSPI, DDR, and all memories on SMC | 
| ICM | Memory Integrity Check Monitoring | Uses a hardware Secure Hash Algorithm (up to SHA256) | More robust than CRC. All internal and external memories such as QSPI, DDR, and all memories on SMC can be monitored | 
| SECUMOD | JTAG | JTAG entry monitor | These tamper pins (JTAG, test, PIOBUs, etc.) can be configured to immediately erase Backup memories (BUSRAM4KB and BUREG256b), or generate an interrupt or a wakeup signal. | 
| Test | Test entry monitor | ||
| IO Tamper Pin | 8 tamper detection pins. Active and Dynamic modes supported. | ||
| Secure Backup SRAM | 5 Kbytes scrambled and non-imprinting avoiding data persistance | 4 Kbytes erasable on tamper detection | |
| Secure Backup Registers | 256-bit register bank, scrambled | Erasable on tamper detection | |
| RTC | RTC | Timestamping of tamper events. Protection against bad configuration (invalid entry for date and time are impossible) | All events are logged in the RTC. Timestamping gives the source of the reset/erase memory/interruption | 
| RTC robustness against glitch attack on 32 kHz crystal oscillator | – | ||
| Secure Fuse | JTAG Access Control | Disable JTAG access by fuse bit | – | 
| Secure Debug Disable | JTAG debug allowed in Normal mode only, not in Secure mode | TrustZone | 
Note: 
- A PCI-certified Advanced Software Crypto Library (ASCL) is available under NDA.
- Refer to the sections on each peripheral for details on FIPS compliancy.
