1.10.4 Security Features

Table 1-5. Security Features
PeripheralFunctionDescriptionComments
TrustZoneSecurity EnclavePartition Secure/Non-secure worldArm technology
Cortex MMUMemory Management UnitCortex-A7 Memory Management Unit
PIOI/O Control/ Peripheral AccessWhen a peripheral is not selected (PIO-controlled), IO lines have no access to the peripheral.
FreezeCapability to freeze either the functional part or the physical part of the configuration.Once the freeze command is issued, no modifications to the current configuration are possible. Only a hardware reset allows a change to the configuration.
Public Key Coprocessor (CPKCC) and associated Classical Public Key Cryptography Library (CPKCL)CryptographyECC (Asymmetric key algorithm, elliptic curves)
RSA (Asymmetric key algorithm)
TDES, TRNG, AES, SHAHardware-accelerated Triple DESFIPS-compliant(1)
True Random Number Generator
Hardware-accelerated AES up to 256 bits
SHA up to 512 and HMAC-SHA
AES, SHA, CPKCC, CPKLCSecure BootCode encrypted/decrypted, Trusted Code Authentication

Hardware AES: Encrypt, Decrypt, CMAC

Hardware SHA

CPKCC, CPKCL: RSA or elliptic curves

AES, TDES, SHA, PIT64B, TCSecurity and safety analysis and reportMonitoring on states or sequences, clocks and waveforms. Error detection can occur only in abnormal operating conditions.
Register access protectionChecks for incorrect accesses.
AES, TDESKey clearing on eventImmediate clearing of the key in case of external tamper event detection
TZAESBOn-the-fly AESOn-the-fly encryption/decryption for NFC_RAM, DDR, QSPI and SMC memories, with respect to TrustZone using TZAESBASCAES128
TZAESBASCDirects data transfer to either the TZAESB secure core or the unsecured TZAESB core
Private Key BusTransfers hidden keys to crypto-engines Capability to transfer keys to or from AES, TZAESB, TDES, TRNG, OTPC in a manner totally invisible by the software.
MemoriesScramblingOn-the-fly scrambling/unscrambling for memoriesSMC, SECURAM, GPBR and QSPI
ICMMemory Integrity Check MonitoringUses a hardware Secure Hash Algorithm
 (up to SHA256)

SMC, DDR, internal SRAM and QSPI

SECUMODJTAGJTAG entry monitorThese tampers (JTAG, test, PIOBUs, monitors, etc.) can be configured to immediately erase Backup memories (BUSRAM4KB and BUREG256b) or generate an interrupt or a wake-up signal.
TestTest entry monitor
Voltage MonitoringVBAT monitoring
VDDCPU monitoring
VDDCORE monitoring
Temperature MonitoringTemperature monitoring
Frequency Monitoring32.768 kHz crystal oscillator monitoring
CPU clock monitoring
IO Tamper Pin4 tamper detection pins. Active and Dynamic modes supported.
Secure Backup SRAM (SECURAM)5 Kbytes scrambled and non-imprinting avoiding data persistance4 Kbytes erasable on tamper detection
Secure Backup Registers256-bit register bank, scrambledErasable on tamper detection
RTCRTCTimestamping of tamper events. Protection against bad configuration (invalid entry for date and time are impossible)All events are logged in the RTC. Timestamping gives the source of the reset/erase memory/interruption
RTC robustness against glitch attack on 32 kHz crystal oscillator
Secure OTPJTAG Access ControlDisable JTAG access by OTP bit
Secure Debug DisableJTAG debug allowed in Normal mode only, not in Secure modeTrustZone
TZWDTWatchdogProtects against TrustZone starvationTrustZone
GPBRPeripheral Access and ProtectionGPBR can be write protected, read protected and immediately cleared on external tamper event detection
Note:
  1. Refer to each peripheral section for details on FIPS compliance.