SPC5-CRYP-LIB. SPC5 Software Cryptography Library. Description. Features. SHA-512 Random engine based on DRBG-AES-128



Similar documents
SPC5-FLASHER. Flash management tool for SPC56xx family. Description. Features

Single LNB supply and control IC DiSEqC 1.X compliant with EXTM based on the LNBH29 in a QFN16 (4x4) Description

M24LRxx/CR95HF application software installation guide

AN3270 Application note

UM1676 User manual. Getting started with.net Micro Framework on the STM32F429 Discovery kit. Introduction

AN3332 Application note

STEVAL-IEG001V2. Smart real-time vehicle tracking system. Features

UM0586 User manual. STM32 Cryptographic Library. Introduction

AN4108 Application note

EN: This Datasheet is presented by the m anufacturer. Please v isit our website for pricing and availability at ore.hu.

UM1727 User manual. Getting started with STM32 Nucleo board software development tools. Introduction

UM1790 User manual. Getting started with STM32L053 discovery kit software development tools. Introduction

UM1680 User manual. Getting started with STM32F429 Discovery software development tools. Introduction

LM337. Three-terminal adjustable negative voltage regulators. Features. Description

AN3354 Application note

Description. Table 1. Device summary. Order code Temperature range Package Packaging Marking

UM1613 User manual. 16-pin smartcard interface ST8034P demonstration board. Introduction

Table 1. Absolute maximum ratings (T amb = 25 C) Symbol Parameter Value Unit. ISO C = 330 pf, R = 330 Ω : Contact discharge Air discharge

DDSL01. Secondary protection for DSL lines. Features. Description

BD238. Low voltage PNP power transistor. Features. Applications. Description. Low saturation voltage PNP transistor

Description. Table 1. Device summary

AN2604 Application note

TN0023 Technical note

STTH1R04-Y. Automotive ultrafast recovery diode. Features. Description

BD241A BD241C. NPN power transistors. Features. Applications. Description. NPN transistors. Audio, general purpose switching and amplifier transistors

EVL185W-LEDTV. 185 W power supply with PFC and standby supply for LED TV based on the L6564, L6599A and Viper27L. Features.

AN3998 Application note

Description. Table 1. Device summary. Order codes. TO-220 (single gauge) TO-220 (double gauge) D²PAK (tape and reel) TO-220FP

AN2389 Application note

UA741. General-purpose single operational amplifier. Features. Applications. Description. N DIP8 (plastic package)

ST19NP18-TPM-I2C. Trusted Platform Module (TPM) with I²C Interface. Features

BD135 - BD136 BD139 - BD140

2STBN15D100. Low voltage NPN power Darlington transistor. Features. Application. Description

ULN2801A, ULN2802A, ULN2803A, ULN2804A

AN3155 Application note

AN4156 Application note

TDA W CAR RADIO AUDIO AMPLIFIER

AN3265 Application note

ST High voltage fast-switching NPN power transistor. Features. Applications. Description

AN2680 Application note

Description SO-8. series. Furthermore, in the 8-pin configuration Very low-dropout voltage (0.2 V typ.)

AN4368 Application note

How To Write To An Eeprom Memory On A Flash Memory On An Iphone Or Ipro Memory On Microsoft Flash Memory (Eeprom) On A Microsoft Microsoft Powerbook (Ai) 2.2.2

UM0985 User manual. Developing your STM32VLDISCOVERY application using the IAR Embedded Workbench software. Introduction

AN2824 Application note

Description. IO and RF AGC. ASIC controller and power management. Carrier recovery loop. GPIO switch matrix. Lock indicator and monitoring DVBS2 FEC

AN3110 Application note

AN3353 Application note

Getting started with DfuSe USB device firmware upgrade STMicroelectronics extension

ETP01-xx21. Protection for Ethernet lines. Features. Description. Applications. Benefits. Complies with the following standards

DSL01-xxxSC5. Secondary protection for DSL lines. Features. Description. Applications. Benefits. Complies with the following standards

ESDLIN1524BJ. Transil, transient voltage surge suppressor diode for ESD protection. Features. Description SOD323

ULN2001, ULN2002 ULN2003, ULN2004

AN2557 Application note

AN1819 APPLICATION NOTE Bad Block Management in Single Level Cell NAND Flash Memories

AN4128 Application note

BZW50. Transil, transient voltage surge suppressor (TVS) Features. Description

LM135-LM235-LM335. Precision temperature sensors. Features. Description

AN3359 Application note

Order code Temperature range Package Packaging

LM134-LM234-LM334. Three terminal adjustable current sources. Features. Description

TDA2004R W stereo amplifier for car radio. Features. Description

Table of Contents. Bibliografische Informationen digitalisiert durch

MC34063AB, MC34063AC, MC34063EB, MC34063EC

AN2866 Application note

L78MxxAB L78MxxAC. Precision 500 ma regulators. Features. Description

STTH110. High voltage ultrafast rectifier. Description. Features

STTH2R06. High efficiency ultrafast diode. Features. Description

Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.

MC Low noise quad operational amplifier. Features. Description

AN2760 Application note

STP60NF06. N-channel 60V Ω - 60A TO-220 STripFET II Power MOSFET. General features. Description. Internal schematic diagram.

AN2703 Application note

STN3NF06L. N-channel 60 V, 0.07 Ω, 4 A, SOT-223 STripFET II Power MOSFET. Features. Application. Description

STP60NF06FP. N-channel 60V Ω - 30A TO-220FP STripFET II Power MOSFET. General features. Description. Internal schematic diagram.

RSA BSAFE. Crypto-C Micro Edition for MFP SW Platform (psos) Security Policy. Version , October 22, 2012

L6234. Three phase motor driver. Features. Description

AN974 APPLICATION NOTE

AN3252 Application note

AN3990 Application note

STDP2600. Advanced HDMI to DisplayPort (dual mode) converter. Features. Applications

AN820 APPLICATION NOTE INPUT/OUTPUT PROTECTION FOR AUTOMOTIVE COMPUTER

P6KE. Transil, transient voltage surge suppressor (TVS) Features. Description. Complies with the following standards

AN3327 Application note

Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version:

AN2328 Application note

Secure Network Communications FIPS Non Proprietary Security Policy

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

AN4427 Application note

STP55NF06L STB55NF06L - STB55NF06L-1

An Introduction to Cryptography as Applied to the Smart Grid

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Pulse Secure, LLC. January 9, 2015

AN886 APPLICATION NOTE

Obsolete Product(s) - Obsolete Product(s)

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

Description. Table 1. Device summary. Order code Temperature range Package Packing Marking

STDP2690. Advanced DisplayPort to DisplayPort (dual mode) converter. Features. Applications

STP10NK80ZFP STP10NK80Z - STW10NK80Z

I N F O R M A T I O N S E C U R I T Y

Transcription:

SPC5 Software Cryptography Library Data brief SHA-512 Random engine based on DRBG-AES-128 RSA signature functions with PKCS#1v1.5 ECC (Elliptic Curve Cryptography): Key generation Scalar multiplication (the base for ECDH) ECDSA Description Features The SPC5 Software Cryptography Library supports the following algorithms AES-128, AES-192, AES-256 bits. Supported modes are: ECB (Electronic Codebook Mode) CBC (Cipher-Block Chaining) with support for ciphertext stealing CTR (CounTer Mode) CCM (Counter with CBC-MAC) GCM (Galois Counter Mode) CMAC KEY WRAP ARC4 DES, TripleDES. Supported modes are: ECB (Electronic Codebook Mode) CBC (Cipher-Block Chaining) HASH functions with HMAC support: MD5 SHA-1 SHA-224 SHA-256 SHA-384 SHA-512 Random engine based on DRBG-AES-128 SPC5 Software Cryptography Library provides an exhaustive set of software algorithms and readyto-use examples for symmetric and asymmetric Encryption/Decryption, message authentication and Random Number Generation. It is an SPC5Studio Eclipse plug-in, available for free download on www.st.com. The software library can run on the whole SPC5 microcontroller family. On SPC564B/EC MCU s, AES-128 ECB/CBC Encryption/Decryption, CMAC Message Authentication, Keys access lock/unlock, secure Key loading/update and Random Number Generation are implemented by an hardware dedicated peripheral (CSE accelerator) to guarantee minimum CPU load and maximum security level (a complete set of software drivers are available as part of SPC5Studio suite www.st.com/spc5studio). For the other members of SPC5 family implementation is fully based on software routines. Order code Table 1. Order code Reference SPC5 Software Cryptography Library May 2014 DocID026317 Rev 1 1/7 For further information contact your local STMicroelectronics sales office. www.st.com

Contents Contents 1 Supported algorithms........................................ 3 1.1 DES and Triple-DES algorithms................................. 3 1.2 AES algorithm.............................................. 3 1.3 ARC4 algorithm............................................. 3 1.4 RNG algorithm.............................................. 4 1.5 HASH algorithm............................................. 4 1.6 RSA algorithm.............................................. 4 1.7 ECC algorithm.............................................. 4 2 Revision history............................................ 6 2/7 DocID026317 Rev 1

Supported algorithms 1 Supported algorithms 1.1 DES and Triple-DES algorithms The data encryption standard (DES) is a symmetric cipher algorithm that can process datablocks of 64 bits under the control of a 64-bit key. The DES core algorithm uses 56 bits for enciphering and deciphering, and 8 bits for parity, so the DES cipher key size is 56 bits. The DES cipher key size has become insufficient to guarantee algorithm security, thus the Triple-DES (TDES) has been devised to expand the key from 56 bits to 168 bits (56 Ñ 3) while keeping the same algorithm core. The Triple-DES is a suite of three DES in series, making three DES encryptions with three different keys. The SPC5 Software Cryptography Library includes the functions required to support DES and Triple- DES modules to perform encryption and decryption using the following modes: ECB (Electronic Codebook Mode) CBC (Cipher-Block Chaining) 1.2 AES algorithm The advanced encryption standard (AES), is a symmetric cipher algorithm that can process data blocks of 128 bits, using a key with a length of 128, 192 or 256 bits. The SPC56 cryptographic library includes AES 128-bit, 192-bit and 256-bit modules to perform encryption and decryption in the following modes: ECB (Electronic Codebook mode) CBC (Cipher-Block Chaining) with support for Ciphertext Stealing CTR (CounTer mode) CCM (Counter with CBC-MAC) GCM (Galois Counter mode) CMAC KEY WRAP 1.3 ARC4 algorithm The ARC4 (also known as RC4) encryption algorithm was designed by Ronald Rivest of RSA. It is used identically for encryption and decryption as the data stream is simply XORed with the generated key sequence. The algorithm is serial as it requires successive exchanges of state entries based on the key sequence. The SPC5 Software Cryptography Library includes functions required to support ARC4, a module to perform encryption and decryption DocID026317 Rev 1 3/7 6

Supported algorithms 1.4 RNG algorithm The security of cryptographic algorithms relies on the impossibility of guessing the key. The key has to be a random number, otherwise the attacker can guess it. Random number generation (RNG) is used to generate an unpredictable series of numbers. The random engine is implemented in software using a CTR_ DRBG based on AES-128, while a True RNG is done entirely by the hardware peripheral. The SPC5 Software Cryptography Library includes functions required to support the RNG module to generate a random number. 1.5 HASH algorithm This algorithm provides a way to guarantee the integrity of information, verify digital signatures and message authentication codes. It is based on a one-way hash function that processes a message to produce a small length / condensed message called a message digest. The SSPC5 Software Cryptography Library includes functions required to support HASH/HMAC modules to guarantee the integrity of information using the following modes: MD5 SHA-1 SHA-224 SHA-256 SHA-384 SHA-512 1.6 RSA algorithm RSA algorithm is a public key cryptographic algorithm designed by Ron Rivest, Adi Shamir, and Leonard Adleman. RSA labs specified some public key cryptographic standards leveraging it. The SPC5 Software Cryptography Library includes functions required to generate and verify digital signatures and encryption / decryption using PKCS#1v1.5 standard, as well as RSA low level computation functions: RSA_PKCS1v15_Sign RSA_PKCS1v15_Verify RSA_PKCS1v15_Encrypt RSA_PKCS1v15_Decrypt RSASP1 RSAVP1 1.7 ECC algorithm SPC5 Software Cryptography Library supports ECC Elliptic Curve Cryptography (ECC) operations for elliptic curves defined over prime fields. 4/7 DocID026317 Rev 1

Supported algorithms Supported functionalities includes ECC key pair generation, ECDSA (Elliptic Curve Digital Signature Algorithm), which can be used to generate and verify digital signatures, and Scalar Multiplication which is the Elliptic Curve operation required by ECDH (Elliptic Curve Diffie-Hellman protocol) that can be used to securely establish a shared key between two peers. DocID026317 Rev 1 5/7 6

Revision history 2 Revision history Table 2. Document revision history Date Revision Changes 27-May-2014 1 Initial release. 6/7 DocID026317 Rev 1

Please Read Carefully: Information in this document is provided solely in connection with ST products. STMicroelectronics NV and its subsidiaries ( ST ) reserve the right to make changes, corrections, modifications or improvements, to this document, and the products and services described herein at any time, without notice. All ST products are sold pursuant to ST s terms and conditions of sale. Purchasers are solely responsible for the choice, selection and use of the ST products and services described herein, and ST assumes no liability whatsoever relating to the choice, selection or use of the ST products and services described herein. No license, express or implied, by estoppel or otherwise, to any intellectual property rights is granted under this document. If any part of this document refers to any third party products or services it shall not be deemed a license grant by ST for the use of such third party products or services, or any intellectual property contained therein or considered as a warranty covering the use in any manner whatsoever of such third party products or services or any intellectual property contained therein. UNLESS OTHERWISE SET FORTH IN ST S TERMS AND CONDITIONS OF SALE ST DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY WITH RESPECT TO THE USE AND/OR SALE OF ST PRODUCTS INCLUDING WITHOUT LIMITATION IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE (AND THEIR EQUIVALENTS UNDER THE LAWS OF ANY JURISDICTION), OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT. ST PRODUCTS ARE NOT DESIGNED OR AUTHORIZED FOR USE IN: (A) SAFETY CRITICAL APPLICATIONS SUCH AS LIFE SUPPORTING, ACTIVE IMPLANTED DEVICES OR SYSTEMS WITH PRODUCT FUNCTIONAL SAFETY REQUIREMENTS; (B) AERONAUTIC APPLICATIONS; (C) AUTOMOTIVE APPLICATIONS OR ENVIRONMENTS, AND/OR (D) AEROSPACE APPLICATIONS OR ENVIRONMENTS. WHERE ST PRODUCTS ARE NOT DESIGNED FOR SUCH USE, THE PURCHASER SHALL USE PRODUCTS AT PURCHASER S SOLE RISK, EVEN IF ST HAS BEEN INFORMED IN WRITING OF SUCH USAGE, UNLESS A PRODUCT IS EXPRESSLY DESIGNATED BY ST AS BEING INTENDED FOR AUTOMOTIVE, AUTOMOTIVE SAFETY OR MEDICAL INDUSTRY DOMAINS ACCORDING TO ST PRODUCT DESIGN SPECIFICATIONS. PRODUCTS FORMALLY ESCC, QML OR JAN QUALIFIED ARE DEEMED SUITABLE FOR USE IN AEROSPACE BY THE CORRESPONDING GOVERNMENTAL AGENCY. Resale of ST products with provisions different from the statements and/or technical features set forth in this document shall immediately void any warranty granted by ST for the ST product or service described herein and shall not create or extend in any manner whatsoever, any liability of ST. ST and the ST logo are trademarks or registered trademarks of ST in various countries. Information in this document supersedes and replaces all information previously supplied. The ST logo is a registered trademark of STMicroelectronics. All other names are the property of their respective owners. 2014 STMicroelectronics - All rights reserved STMicroelectronics group of companies Australia - Belgium - Brazil - Canada - China - Czech Republic - Finland - France - Germany - Hong Kong - India - Israel - Italy - Japan - Malaysia - Malta - Morocco - Philippines - Singapore - Spain - Sweden - Switzerland - United Kingdom - United States of America www.st.com DocID026317 Rev 1 7/7 7