SLUUDG7
December 2025
MSPM33C321A
1
Abstract
Trademarks
1
Overview of Security Functionality
1.1
Terminology
2
Secure Execution Environment
2.1
TrustZone
2.1.1
Implementation Defined Attribution Unit
2.1.2
Security Attribution Unit
2.1.3
TrustZone software development
2.2
Memory Protection Unit
2.2.1
TrustZone and MPU
2.3
Global Security Controller
2.3.1
GSC Memory configuration
2.3.1.1
Security Exceptions through the GSC & SAU
2.3.1.2
Priviledge exceptions with GSC & MPU
3
Security Modules
3.1
AES
3.1.1
AES Overview
3.1.2
AES Usage
3.1.2.1
Configuration
3.1.2.2
Setup
3.1.2.3
Operation
3.2
Keystore
3.2.1
Overview
3.2.2
Keystore Usage
3.2.2.1
Configuration
3.2.2.2
Setup
3.2.2.3
Operation
3.3
SHA2
3.3.1
SHA Introduction
3.3.1.1
SHA features
3.3.2
SHA Performance
3.3.3
SHA Usage
3.3.3.1
Configuration
3.3.3.2
Setup
3.3.3.3
Operation
3.4
PKA
3.4.1
PKA Introduction
3.4.1.1
PKA features
3.4.2
PKA Usage
3.4.2.1
Configuration
3.4.2.2
Setup
3.4.2.3
Operation
3.5
PQC
3.5.1
ML-DSA
3.5.1.1
ML-DSA Introduction
3.5.1.2
ML-DSA Usage
3.5.1.2.1
Configuration
3.5.1.2.2
Setup
3.5.1.2.3
Operation
4
Revision History
3.5.1.1
ML-DSA Introduction
ML-DSA is one of the NIST defined PQC algorithms used to protect against threats from quantum computers. This standard can be used with Customer Secure Code (CSC) to ensure the authenticity of an embedded application.