SLVAF22C January 2021 – October 2024 TPS544C26 , TPS544C27 , TPS544E27 , TPS546C25 , TPS546E25 , TPS548A28 , TPS548B23 , TPS548B28 , TPS548C26 , TPS548D26 , TPS54J061 , TPS54KB20 , TPS54KC23 , TPS748A
Traditionally, digitally controlled power designs, whether using I2C, SMBus, PMBus, SVID or some other digital interface, have relied on the security of the bus controller devices to prevent malicious actors from gaining access and using the digital control to shut down the converter or even damage hardware. That was considered good enough for most applications. With the ever increasing presence of digital interfaces, and ever more sophisticated threats, that is no longer always sufficient to make sure the integrity of a system. When a device is connected to a remote interface, there is the possibility for remote actors to gain access the digital bus through one of the connected devices, and potentially send malicious commands over the bus. Table 4-1 shows the latest DC/DC converters with security features.
Device | Digital interface | Security | Current & package |
---|---|---|---|
TPS544C27 | SVID, PMBus | Level 2 | 35A, 4x5mm |
TPS544E27 | SVID, PMBus | Level 2 | 40A, 5x6mm |
TPS546C25 | PMBus | Passkey | 35A, 4x5mm |
TPS546E25 | PMBus | Passkey | 50A, 5x6mm |
The PASSKEY feature provides the designer with a intermediate level of security between the open security, and the permanent lock created by using the write-protect command for protection. PASSKEY is a 16-bit digital key. When set, PASSKEY disabled write access to both EXT_WRITE_PROTECT and the User NVM store until the PASSKEY is written back to the device. To protect devices from brute force attacks, PASSKEY is limited to three failed PASSKEY write attempts per power-cycle.
Level 2 security uses a 32 byte pre-shared key (PSK) to perform device attestation and authenticated updates. Both of these functions use a combination of SHA2-384 and HMAC SHA2-256 hash algorithms within the device to calculate the message authentication code (MAC). In the case of device attestation, the MAC calculated by the device is compared to an expected MAC to verify the device has the correct PSK programmed and NVM configuration.