6 STM32 security features ..........................................................27
6.1 Overview of security features ...................................................27
6.1.1 Static and dynamic protections .............................................27
6.1.2 Security features by STM32 devices .........................................27
6.2 Readout protection (RDP) ......................................................29
6.3 Lifecycle management–product state .............................................31
6.4 One-time programmable (OTP)..................................................32
6.5 TrustZone® ..................................................................32
6.5.1 Core state .............................................................33
6.5.2 Secure attribution unit (SAU)...............................................33
6.5.3 Memory and peripheral protections ..........................................34
6.6 Flash memory write protection (WRP) ............................................34
6.7 Execute-only firmware (PCROP).................................................34
6.8 Secure hide protection (HDP) ...................................................35
6.9 Firewall ......................................................................35
6.10 Memory protection unit (MPU)...................................................37
6.11 Customer key storage (CKS)....................................................38
6.12 Antitamper (TAMP)/backup registers (BKP)........................................39
6.13 Clock security system (CSS) ....................................................39
6.14 Power monitoring (PVD)........................................................39
6.15 Memory integrity hardware check ................................................39
6.16 Independent watchdog (IWDG) ..................................................40
6.17 Device ID ....................................................................40
6.18 Cryptography .................................................................40
6.18.1 Hardware accelerators ...................................................40
6.18.2 CryptoLib software library .................................................40
6.19 On-the-fly decryption engine (OTFDEC) ..........................................41
7 Guidelines........................................................................42
8 Conclusion .......................................................................44
Appendix A Cryptography - Main concepts ...........................................45
A.1 Secret key algorithms ..........................................................45
A.2 Public key algorithms (PKA) ....................................................46
A.3 Hash algorithms ..............................................................47
A.4 MAC or signature and certificate .................................................47
Revision history .......................................................................49
AN5156
Contents
AN5156 - Rev 8
page 53/56