SPRT788 May 2025 AM2612 , AM2612-Q1 , AM2631 , AM2631-Q1 , AM2632 , AM2632-Q1 , AM2634-Q1 , AM263P2-Q1 , AM263P4 , AM263P4-Q1
TIFS stands for Texas Instruments Foundational Security for AM26xx SoCs. It provides device root of trust and foundational security services. The HSM or hardware security module consists of a secure core based secure subsystem.
TIFS-MCU serves as an add-on package on top of MCU+ SDK offering for AM26xx devices like AM263x/AM263Px/AM261x. TIFS-MCU enables a baremetal security stack on secure CPU that can be leveraged by the user too.
TIFS-MCU is not a replacement for AUTOSAR-HSM stack. TIFS-MCU enables foundational security SW with all the building blocks required for root-of-trust within the device and utilizes various services. TIFS-MCU can be easily integrated by AUTOSAR-HSM stack vendors to develop HSM stacks that adhere to SHE/EVITA standards.
Features of Secure Boot | Algorithm Supported (AM263x/AM263Px) | Algorithm Supported (AM261x) | Support available in 10.02.00 |
|---|---|---|---|
HSM Run Time Firmware Boot |
|
| Yes |
SBL Boot |
|
| Yes |
Features of Secure Boot | Algorithm Supported (AM263x) | Algorithm Supported (AM263Px) | Algorithm Supported (AM261x) | Support Available in 10.02.00 |
|---|---|---|---|---|
RAM based Multi Core Application Boot through Root Keys |
|
|
| Yes |
XiP based Multi Core Application Boot through Root Keys |
|
|
| Yes |
RAM based Multi Core Application Boot through Auxilary Keys |
|
|
| Yes |
XiP based Multi Core Application Boot through Auxilary Keys |
|
|
| Yes |
| List of Software Components | Software Type | OPN | Delivery Location | Source Available in 10.02.00 |
|---|---|---|---|---|
SBL Keywriter | Example | AM263X_RESTRICTED_SECURITY | Secure Resources | Yes |
AM263PX_RESTRICTED_SECURITY | ||||
AM261x-TIFS-SDK | ||||
Uart Bootloader | Tool for -
| MCU_PLUS_SDK | ti.com | Yes |
Uart Uniflash | Tool for -
| MCU_PLUS_SDK | ti.com | Yes |
OTP Key Writer Certificate Generation | Python tool | AM263X_RESTRICTED_SECURITY | Secure Resources | Yes |
AM263PX_RESTRICTED_SECURITY | ||||
AM261x-TIFS-SDK | ||||
OTP KW HSM firmware | Encrypted and signed with TI Keys | AM263X_RESTRICTED_SECURITY | Secure Resources | No |
AM263PX_RESTRICTED_SECURITY | ||||
AM261x-TIFS-SDK | ||||
SBL and HSM signing tool | Python tool | MCU_PLUS_SDK | Secure Resources | Yes |
App signing tool | Python tool | MCU_PLUS_SDK | Secure Resources | Yes |
Figure 2 Top Security Features of TIFS-SDK of AM26x Devices
Figure 3 AM261x SW Block DiagramTIFS-MCU Software Components | Description |
|---|---|
OS Kernel | |
No RTOS | Contains modules which implement no-RTOS execution environment consisting of timers, ISR, main thread. Allows software on top to run in bare metal mode. Note - HSM Server is only supported in NORTOS. |
Driver Porting Layer (DPL) | APIs used by drivers to abstract the OS environment. Example, Semaphore, HW interrupts, mutex, clock. |
|
Security Device Drivers and Modules |
|
TIFS-MCU Peripheral Drivers | Device Drivers library and APIs for HSM. List of SOC Peripheral Driver:
|
TIFS-MCU Middle-ware | TIFS-MCU middleware that are supported in TIFS-MCU package List of Middleware:
|
TIFS-MCU Services | TIFS-MCU middleware that are supported in TIFS-MCU package List of HSM Services:
|
TIFS-MCU Firmware | Out of Box Example implementation of TIFS-MCU firmware with all the mentioned services enabled |
|
Examples and Demos |
|
Examples and Demos | List of HSM Examples:
|
Tools (used on host machine) | |
Code Composer Studio (CCS) | IDE used to build projects, debug programs |
TI CLANG Compiler Toolchain | CLANG based ARM compiler from TI for ARM M4F, R5F |
SysConfig | System configuration tool, used to configure peripherals, pinmux, clocks and generate system initialization code |
SDK Tools and Utilities | Additional tools and utilities, like flashing tools, booting tools, CCS loading scripts used with the SDK development flow |
OTP Keywriter | OTP Keywriter is used to fuse customer keys into the device and convert HS-FS to HS-SE to establish customer root-of-trust. |
TIFS-MCU tools | Tools and scripts to leverage the services provided via |
| Services | Description | Examples Available |
|---|---|---|
HSM Get Version Service | HSM GetVersion service is to get the current TIFS-MCU Firmware version | Yes |
HSM Get UID Service | When TIFS-MCU Firmware receives a request to GetUID from HSM Server, the UID is copied from secure memory to the output memory location requested by the user. | Yes |
HSM Run Time Debug Authentication Service | To unlock the debug port during the run-time, you need an X509 certificate signed with private keys. This service is used to provide the signed certificate to TIFS-MCU Firmware for processing. | Yes |
HSM Derived KEK Service | TIFS-MCU provides this service to get a derived KEK based on some input constants.
| Yes |
HSM Random Number Generate Service | TIFS-MCU provides this service to get a random number from the given input constants. | Yes |
| HSM Runtime Firewall Service | TIFS-MCU provides this service to program the system firewalls controlled by HSM only for protection, isolation etc. | Yes |
| HSM Extended OTP Service | TIFS-MCU provides this service to program general purpose or user defined OTP row programming. | Yes |
| HSM Anti Rollback Service | TIFS-MCU provides this service to program SW revisions in the eFuses to prevent Anti-Rollback to previous software in the system. | Yes |
| HSM Root of Trust Switch Service | TIFS-MCU provides this service to change the root of trust switch from the primary key to backup key. | Yes |
| HSM Proc Auth Boot Service | TIFS-MCU provides the Proc Auth Boot service to authenticate and decrypt the application images signed with root or auxillary keys. | Yes (part of SBL in MCU+ SDK) |
| HSM Key Import Service | TIFS-MCU provides the Key import service to import the Auxillary keys into the system. | Yes (part of SBL in MCU+ SDK) |
| HSM OTFA Service | TIFS-MCU provides the OTFA service to configure the OTFA regions based on root as well as auxiliary keys. | Yes (part of SBL in MCU+ SDK) |
| Crypto Core | Support Available in SW Driver | Examples Available | Specification |
|---|---|---|---|
AES Encryption and Decryption |
| Yes | |
AES MAC Generation and Verification |
| Yes | |
SHA Hasing Algorithm |
| Yes | |
RSA Encryption and Decryption Signing and Verification |
| RSA PKCS1_5 with 4K only | |
RSA Key Generation Service |
| Example with 4096 bit key only (only for AM261x) | |
ECDSA Signing and Verification |
| Yes | |
ECDSA Key Generation Service |
| Yes | |
EDDSA Signing and Verification |
| Yes | |
| ECDH |
| Yes (only for AM261x) |