SPRUJ17H March 2022 – October 2024 AM2631 , AM2631-Q1 , AM2632 , AM2632-Q1 , AM2634 , AM2634-Q1
This chapter describes the Hardware Security Module (HSM) in the device.
The HSM module is responsible for booting up of the device, enabling the main R5FSS core, defining/controlling overall security of the device based on boot options provided. It also has a DTHE (Data Transform and Hashing Engine) which is a wrapper around crypto IP with some additional capability including CRC and Checksum.
Table 7-93 provides a list of abbreviations related to hardware security.
Abbreviation | Description |
---|---|
AES | Advanced Encryption Standard |
DRBG | Deterministic random bit generator |
ECC | Elliptic curve cryptography |
HMAC | Keyed-hashing for message authentication |
ISC | Initiator-side security control |
PKA | Public key cryptography |
RSA | Rivest–Shamir–Adleman cryptosystem |
SHA | Secure hash algorithm |
TRNG | True random number generator |