2.1 PIC32CM Lx Family of Microcontrollers (MCUs)
The PIC32CM Lx Family of microcontrollers provides robust security, ultra-low power, enhanced touch, and smart analog while running at 48 MHz, with memory configurations of up to 512 KB Flash and 64 KB SRAM. These MCUs come in three variants: PIC32CM LS60, PIC32CM LS00, and the PIC32CM LE00 with 48, 64 and 100-pin variations.
The PIC32CM LE00 is a general-purpose variant. The PIC32CM LS00 provides security features, such as secure boot and Arm® TrustZone® technology, and the PIC32CM LS60 integrates Arm TrustZone technology with our Trust Platform ECC608 secure element in one package, which is supported by the Trust Platform key provisioning services and Trust Platform Design Suite v2. The following features of the PIC32CM LSx MCU enable protection from cloning. For more information on the PIC32CM Lx Family of MCUs, refer to the PIC32CM Lx MCUs.
The features on the PIC32CM LSx MCUs, which prevent cloning, are covered in the following sections.
Cortex M23 Arm® Trust Zone®
The PIC32CM LS60 MCU is enriched with Arm Trust Zone technology. This allows both secure and non-secure programs to run on the same chip. TrustZone creates isolated secure zones that grant access to specific memory, peripherals, and data only to authorized software, ensuring system integrity without sacrificing performance.
ATECC608B Secure Element
The ATECC608B safeguards sensitive information. It accomplishes this through cryptographic protocols and robust hardware security features.
Cryptographic Protocols:
- Elliptic Curve Diffie-Hellman (ECDH): Facilitates secure key exchange for encryption and decryption.
- Elliptic Curve Digital Signature Algorithm (ECDSA): Ensures data integrity and authenticity through digital signatures.
Hardware Security Features:
- Secure Cryptographic Engine: Implements industry-standard cryptographic algorithms (ECC, SHA, and AES) to protect data transfer between the device and memory.
- Secure Key and Data Storage: Offers secure storage for encryption keys and confidential data, making it inaccessible to unauthorized users.
- Unique Serial Number: Allows for individual identification and enhanced security.
- Monotonic Counters: Tracks the number of authentication attempts, aiding in anomaly detection and potential security breaches.
- High-Quality Random Number Generator: The generator produces unpredictable numbers essential for secure communication.
- Tamper-Hardened Hardware Boundary: The physical construction of the device hinders attackers from tampering with its internal components and accessing sensitive information.