Data Encryption And Authentication - Silicon Laboratories EFR32xG14 Wireless Gecko Reference Manual

Table of Contents

Advertisement

2.15 Data Encryption and Authentication

EFR32 has hardware support for AES encryption, decryption and authentication modes. These security operations can be performed
on data in RAM or any data buffer, without further CPU intervention. The key size is 128 bits.
AES modes of operations directly supported by the EFR32 hardware are listed in
Support on page
35. In addition to these modes, other modes can also be implemented by using combinations of modes. For exam-
ple, the CCM mode can be implemented using the CTR and CBC-MAC modes in combination.
AES Mode
ECB
CTR
CCM
CCM*
GCM
CBC
CBC-MAC
CMAC
CFB
OFB
The CRYPTO module can operate directly on data buffers provided by the BUFC module. It is also possible to provide data directly
from the embedded Cortex-M4 or via DMA.
A True Random Number Generator (TRNG) module is also included for additional security. The TRNG is a non-deterministic random
number generator based on a full hardware solution, and is suitable for cryptographic key generation.
silabs.com | Building a more connected world.
Table 2.2. AES Modes of Operation With Hardware Support
Encryption / Decryption
Yes
Yes
Yes
Yes
Yes
Yes
-
-
Yes
Yes
Table 2.2 AES Modes of Operation With Hardware
Authentication
-
-
Yes
Yes
Yes
-
Yes
Yes
-
-
Reference Manual
System Overview
Comment
Electronic Code Book
Counter mode
Counter with CBC-MAC
CCM with encryption-only and
integrity-only capabilities
Galois Counter Mode
Cipher Block Chaining
Cipher Block Chaining, Mes-
sage Authentication Code
Cipher-based MAC
Cipher Feedback
Output Feedback
Rev. 1.1 | 35

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the EFR32xG14 Wireless Gecko and is the answer not in the manual?

Questions and answers

Table of Contents