What's in Applications- Platform Security.

Getting Started

Arm CryptoCell-312 is a comprehensive security solution for low power, low area designs.

It enhances SoC-level security with features protecting the authenticity, integrity and confidentiality of code and data belonging to different stakeholders (for example the chip maker, device maker, service provider and user).

The Armv8-M inherent capability serves as a Root of Trust (RoT), isolating assets in one execution environment and preventing them from being exploited through software vulnerabilities in another environment.

As the lock diagram on the right illustrates, CryptoCell-312 both complements the isolation and builds on it. It provides additional trust anchors and security mechanisms to assure the execution state is safe (for a given threat model).

These mechanisms include: persistent storage of secrets, rollback prevention, validation of loaded software, validation of software updates, cryptography, True Random Number Generation, strong authentication of parties prior to giving them access to resources and more.


Simplifying the design of secure IoT systems

Free on-demand training webinar about Arm CryptoCell

Want to know more about Arm CryptoCell?

Start designing now

Arm Flexible Access gives you quick and easy access to this IP, relevant tools and models, and valuable support. You can evaluate and design solutions before committing to production, and only pay when you’re ready to manufacture.

A locking device.

Balancing the right security solution

A security solution balances the right set of measures so you can effectively address the target threat model, without affecting the usability of the product. It’s important to ensure that the user experience is not impacted, while maintaining the overall power and area budget.

The certifiable CryptoCell-312 solution allows you to tick all the boxes, using hardware, on-chip software and a rich set of off-device tools, addressing various manufacturing and ecosystem enablement processes (e.g. certificates generation, code encryption and more).

All of the CryptoCell-312 components are provided in source code format.

 

Validating if a system works.

Enabling a full set of security services

Designed with all relevant, state-of-the-art security related standards in mind, CryptoCell-312 supports the following functional features:

  • Symmetric and asymmetric cryptography.
  • True Random Number Generator.
  • Device lifecycle state management.
  • Root of Trust access policy enforced by hardware means.
  • Root of Trust ownership model allowing multiple entities to own different trust anchor, removing the need for default trust between entities along the value chain.
  • Keys and assets provisioning, management and isolation, across different device operational scenarios, both in-factory and in the field.
  • Software image validation and optional decryption both at boot time and update time.
  • Secure debug and design for test.

The key benefits of CryptoCell-312

CoreLink SSE-200 Subsystem Block Diagram.

  • CryptoCell-312 allows design teams to get security right.
  • Free up tens of man years and enabling design teams to focus on their real differentiation.
  • Validated and integrated with SSE-200, SIE-200Cortex-M23, Cortex-M33 and v8-M software stack.

  • CryptoCell-312 provides a rich set of platform security services, enabling brand-name protection, IP protection (improved monetization of R&D investment) and various use cases across all IoT markets.
  • CryptoCell-312 increases performance by 10-15x (when compared to software only operations) on cryptography tasks.

Hardware Performance

Hardware performance: based on hardware only, zero ABH read/write delay and 1KB chunks of data

   Hardware performance, including DMA and AHB (Bits/clock)
HASH SHA256
 5.88
AES (128b keys)
 3.07
CHACHA20  6.18

Frequency

CryptoCell-312 gets to 200MHz on TSMC CLN40ULP (7T).

Want to know more about Security on Arm?

Learn more

Get support

Community Forums

Answered Where should I ask my question?
  • ARM Community
0 votes 946 views 1 replies Latest 1 months ago by Oliver Beirne Answer this
Not answered Where do I find presentations and photos from SC'18? 2 votes 5081 views 0 replies Started 1 years ago by John Linford Answer this
Answered How to make Ethos-U NPU work on an ARM Cortex-A + Cortex-M processor? 0 votes 983 views 9 replies Latest 8 hours ago by alisonw Answer this
Suggested answer Which ARM board will be most suitable?
  • Video Processor Embedded Algorithms
  • Video Processor
0 votes 1647 views 3 replies Latest 16 hours ago by Dharmalingam.K Answer this
Not answered Unable to untick startup file in Project->Manage->Runtime Environment
  • stm32cubemx
0 votes 73 views 0 replies Started 17 hours ago by Nevel Answer this
Answered Porting a mali_egl_image* Utgard application to Midgard 0 votes 2195 views 3 replies Latest 19 hours ago by Ben Clark Answer this
Answered Where should I ask my question? Latest 1 months ago by Oliver Beirne 1 replies 946 views
Not answered Where do I find presentations and photos from SC'18? Started 1 years ago by John Linford 0 replies 5081 views
Answered How to make Ethos-U NPU work on an ARM Cortex-A + Cortex-M processor? Latest 8 hours ago by alisonw 9 replies 983 views
Suggested answer Which ARM board will be most suitable? Latest 16 hours ago by Dharmalingam.K 3 replies 1647 views
Not answered Unable to untick startup file in Project->Manage->Runtime Environment Started 17 hours ago by Nevel 0 replies 73 views
Answered Porting a mali_egl_image* Utgard application to Midgard Latest 19 hours ago by Ben Clark 3 replies 2195 views