SLUUDG7
December 2025
MSPM33C321A
1
Abstract
Trademarks
1
Overview of Security Functionality
1.1
Terminology
2
Secure Execution Environment
2.1
TrustZone
2.1.1
Implementation Defined Attribution Unit
2.1.2
Security Attribution Unit
2.1.3
TrustZone software development
2.2
Memory Protection Unit
2.2.1
TrustZone and MPU
2.3
Global Security Controller
2.3.1
GSC Memory configuration
2.3.1.1
Security Exceptions through the GSC & SAU
2.3.1.2
Priviledge exceptions with GSC & MPU
3
Security Modules
3.1
AES
3.1.1
AES Overview
3.1.2
AES Usage
3.1.2.1
Configuration
3.1.2.2
Setup
3.1.2.3
Operation
3.2
Keystore
3.2.1
Overview
3.2.2
Keystore Usage
3.2.2.1
Configuration
3.2.2.2
Setup
3.2.2.3
Operation
3.3
SHA2
3.3.1
SHA Introduction
3.3.1.1
SHA features
3.3.2
SHA Performance
3.3.3
SHA Usage
3.3.3.1
Configuration
3.3.3.2
Setup
3.3.3.3
Operation
3.4
PKA
3.4.1
PKA Introduction
3.4.1.1
PKA features
3.4.2
PKA Usage
3.4.2.1
Configuration
3.4.2.2
Setup
3.4.2.3
Operation
3.5
PQC
3.5.1
ML-DSA
3.5.1.1
ML-DSA Introduction
3.5.1.2
ML-DSA Usage
3.5.1.2.1
Configuration
3.5.1.2.2
Setup
3.5.1.2.3
Operation
4
Revision History
3.4.1.1
PKA features
The PKA engine provides the following basic operations
Large vector addition, subtraction and combined addition and subtraction
Large vector shift left or right
Large vector multiplication and division (with or without quotient)
Large vector compare and copy
The PKA engine provides the following complex operations:
Large vector unsigned value modular exponentiation
Large vector unsigned value modular exponentiation using the CRT method with pre-calculated Q inverse vector
Modular inversion
ECC operations on two type of curve: Montgomery curves like Curve25519 and Curve448, and any curve of the form y
2
=x
3
+ax+b (mod p).
ECC point addition/doubling on elliptic curve with affine or projective points as input/output
ECC point multiplication on elliptic curve
Illegal state and timing attack detection