EasyManuals Logo

ST STM32C0 Series Application Note

ST STM32C0 Series
56 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #55 background imageLoading...
Page #55 background image
List of figures
Figure 1. Corrupted connected device threat ......................................................5
Figure 2. IoT system ...................................................................... 12
Figure 3. Armv8-M TrustZone® execution modes .................................................. 17
Figure 4. Simplified diagram of dual-core system architecture ......................................... 17
Figure 5. Memory types.................................................................... 18
Figure 6. Secure boot FSM ................................................................. 24
Figure 7. Secure server/device SFU architecture ..................................................25
Figure 8. Example of RDP protections (STM32L4 series)............................................. 30
Figure 9. TrustZone® implementation at system level ............................................... 33
Figure 10. HDP protected firmware access ....................................................... 35
Figure 11. Firewall FSM .................................................................... 36
Figure 12. Firewall application example.......................................................... 36
Figure 13. Dual-core architecture with CKS service ................................................. 38
Figure 14. Typical OTFDEC configuration ........................................................ 41
Figure 15. Symmetric cryptography ............................................................ 45
Figure 16. Signature ....................................................................... 46
Figure 17. PKA encryption................................................................... 46
Figure 18. Message hashing ................................................................. 47
Figure 19. MAC generation with secrete key algorithm ............................................... 47
Figure 20. Signature generation with public key algorithm ............................................. 48
AN5156
List of figures
AN5156 - Rev 8
page 55/56

Table of Contents

Other manuals for ST STM32C0 Series

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the ST STM32C0 Series and is the answer not in the manual?

ST STM32C0 Series Specifications

General IconGeneral
BrandST
ModelSTM32C0 Series
CategoryComputer Hardware
LanguageEnglish

Related product manuals