9.2 Design for Security

The device embeds peripherals with security features to prevent counterfeiting, to secure external communication, and to authenticate the system.

The table below provides the list of peripherals and an overview of their security function. For more information, refer to the section on each peripheral.

PeripheralFunctionDescriptionComments
Secure Boot Trusted Code AuthenticationBased on hardware accelerated cryptographic modulesSoftware + AES, SHA
Cortex-M4 MPUMemory Protection UnitAES/SHA
PIOI/O Control/ Peripheral AccessWhen a peripheral is not selected (PIO-controlled), I/O lines have no access to the peripheral.
Classical Public Key Crypto Library (CPKCL)Cryptography standardsSoftware ECC (Asymmetric key algorithm, elliptic curves)Software library
Software RSA (Asymmetric key algorithm)
AESHardware-accelerated AES up to 256 bitsFIPS-compliant
SHASHA up to 512 bits and HMAC-SHAFIPS-compliant
TRNGCryptographyTrue Random Number Generator
AESAnti-tamperingImmediate clear of keys in case of external tamper event detection (if enabled)
AES, SHAReinforced securityImproved robustness against attack
Integrity checkUser-configurable immediate stop on integrity error detection When the security error status flag is set in the user interface, an integrity error has been detected. These errors can occur only under abnormal operating conditions (electromagnetic attacks, VDD glitches, etc.)
AES, SHA, TC, ICM, TRNGSoftware access monitoring and integrity checkDedicated interrupt line for security event

Non-maskable in the peripheral. When a security error status flag is set in the user interface, an interrupt is triggered. These errors can occur only under abnormal operating conditions (electromagnetic attacks, VDD glitches, etc.)

FlashSecurity bitReinforced Security bit to disable JTAG access

Secure area key storage

Flash, GPBRHW Flash Erase signalFlash memory array is erased prior to Security bit erase
SRAM content can be configured to be erased on ERASE pin activation
GPBR can be configured to be erased on ERASE pin activation
AES keys and QSPI scrambling keys are erased on ERASE pin activation
QSPIScramblingOn-the-fly zero-wait state or zero latency scrambling/unscrambling