SWPB 019 e
SWPB 019 e
com
Application Brief
Understanding Security Features for C2000 Real-Time
Control MCUs
SWPB019E – APRIL 2017 – REVISED AUGUST 2024 Understanding Security Features for C2000 Real-Time Control MCUs 1
Submit Document Feedback
Copyright © 2024 Texas Instruments Incorporated
www.ti.com
When a new device is shipped from TI, the device The widely used AES symmetric cipher is known
arrives in a completely unlocked state. After security for speed and simplicity. Even given that, a
protocols are enabled by the user, any locked memory software implementation of the AES algorithm in
zone is only accessible by code that also exists an embedded microcontroller is relatively slow
in the same zone. Dedicated unlocked memory is to the demands of a real-time control system.
available so that data can be transferred between The hardware AES accelerator vastly improves
zones if needed. In addition to this fundamental processing time for cryptographic messages,
building block, there are other options or layers that while freeing up the CPU bandwidth in the
can be selectively enabled: process. Several different operational modes and
key sizes are available.
1. Selection of memory blocks to be protected: 9. Secure Boot:
In many cases, not all the memory, either volatile To maintain the integrity of firmware stored in
or nonvolatile, needs to be locked. This case the device, secure boot can be enabled to verify
can be true for certain pieces of firmware shared code stored in Flash memory before transferring
across different sub-systems, or that contain non- execution to the stored code. Along with the
proprietary IP. firmware programming protections built into the
2. Zone ownership (DCSM only): security logic, this helps make sure the code that
In addition to protecting various blocks of runs on the device is authentic. The algorithm
memory, there are two zones in each DCSM used is an AES-128 CMAC algorithm. Tools are
implementation. Once the memories are allocated available to embed the required MAC value into
for protection, the next step is deciding which the final code image. For more information, see
of these zones has control over the selected Secure Boot on C2000 Device .
memories. However, if there is no need for 10. Flash Write and Erase Protection:
code protection between developers on the same In certain cases, users can opt to extend
device, a single-zone configuration can be used. secure boot functionality by implementing other
3. Execute-only protection (DCSM only): cryptographic authentication algorithms, including
If a region is used only for execution, rather than elliptic curve-based functions such as ECDSA.
internal data storage, the programmer can enable In devices with Flash write and erase protection,
execute-only protection to block any read access these functions can be placed in Flash regions at
(even from the same region or zone), for added the entry point of code, and made immutable (that
security. is, permanently unchangeable and unmodifiable).
4. CPU protection (DCSM only): This feature enables stronger cryptographic
capabilities, and can also be used to enable
Debug access to the core processing unit (CPU) secure firmware update functions.
registers is also blocked if the DCSM detects
code executing from any locked region.
5. Emulation Code Security Logic (ECSL):
Even with the above measures, users can restrict
an emulation connection if the MCU is executing
from a locked region. This security feature can be
temporarily disabled during a debug session using
a password.
2 Understanding Security Features for C2000 Real-Time Control MCUs SWPB019E – APRIL 2017 – REVISED AUGUST 2024
Submit Document Feedback
Copyright © 2024 Texas Instruments Incorporated
www.ti.com Trademarks
Additional Resources
While security risks can take many forms across end
applications, firmware intellectual property protection
is a threat common to most systems. C2000
microcontrollers enable users to address these
concerns through flexible features for multiuser
development environments. For more information
on C2000 microcontrollers, see TI.com/C2000. For
specific information on the security features present
in each C2000 device, see the product data sheet and
technical reference manual available on the TI.COM™
product page.
Note
Security is hard. TI makes cybersecurity easier.
For more information about TI’s Embedded Security Designs, visit TI.com/security.
Trademarks
C2000™ and TI.COM™ are trademarks of Texas Instruments.
All trademarks are the property of their respective owners.
SWPB019E – APRIL 2017 – REVISED AUGUST 2024 Understanding Security Features for C2000 Real-Time Control MCUs 3
Submit Document Feedback
Copyright © 2024 Texas Instruments Incorporated
IMPORTANT NOTICE AND DISCLAIMER
TI PROVIDES TECHNICAL AND RELIABILITY DATA (INCLUDING DATA SHEETS), DESIGN RESOURCES (INCLUDING REFERENCE
DESIGNS), APPLICATION OR OTHER DESIGN ADVICE, WEB TOOLS, SAFETY INFORMATION, AND OTHER RESOURCES “AS IS”
AND WITH ALL FAULTS, AND DISCLAIMS ALL WARRANTIES, EXPRESS AND IMPLIED, INCLUDING WITHOUT LIMITATION ANY
IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT OF THIRD
PARTY INTELLECTUAL PROPERTY RIGHTS.
These resources are intended for skilled developers designing with TI products. You are solely responsible for (1) selecting the appropriate
TI products for your application, (2) designing, validating and testing your application, and (3) ensuring your application meets applicable
standards, and any other safety, security, regulatory or other requirements.
These resources are subject to change without notice. TI grants you permission to use these resources only for development of an
application that uses the TI products described in the resource. Other reproduction and display of these resources is prohibited. No license
is granted to any other TI intellectual property right or to any third party intellectual property right. TI disclaims responsibility for, and you
will fully indemnify TI and its representatives against, any claims, damages, costs, losses, and liabilities arising out of your use of these
resources.
TI’s products are provided subject to TI’s Terms of Sale or other applicable terms available either on ti.com or provided in conjunction with
such TI products. TI’s provision of these resources does not expand or otherwise alter TI’s applicable warranties or warranty disclaimers for
TI products.
TI objects to and rejects any additional or different terms you may have proposed. IMPORTANT NOTICE
Mailing Address: Texas Instruments, Post Office Box 655303, Dallas, Texas 75265
Copyright © 2024, Texas Instruments Incorporated