cancel
Showing results for 
Search instead for 
Did you mean: 

STM32U375 PKA peripheral

Nasreen_Shaikh
Visitor
We have a query regarding STM32U375 PKA peripheral.
As per datasheet, the peripheral is available for this variant.
 
Nasreen_Shaikh_2-1768309069472.png


Under the "STM32Cube/Repository/STM32Cube_FW_U3_V1.2.1/Drivers/STM32U3xx_HAL_Driver/" we can also see that stm32u3xx_hal_pka.c and stm32u3xx_hal_pka.h driver files are available.
 
However, the ST official product page - does not seem to mention this peripheral as a part of STM32U375 series.
Nasreen_Shaikh_3-1768309082216.png

 

 

 

 
Also, we cannot see this peripheral in graphical configuration .ioc.
 
Please let us know if this is available as part of STM32U375 series and how to use it.
We also need STM32U375.svd for debugging support, please share this file.
1 REPLY 1
KDJEM.1
ST Employee

Hello @Nasreen_Shaikh and welcome to the community;

 

The STM32U375xx devices use the PKA in limited mode (only ECDSA signature verification is available).

As mentioned in STM32U375 datasheet, the PKA (public key accelerator) in STM32U375 can verify ECDSA signatures, with all needed computation performed within the accelerator. Application CPU is only needed to manage the inputs and the outputs of the operation.
The PKA main features in STM32U375 are:
• ECDSA signature verification
• Capability to handle operands up to 640 bits
• AMBA® AHB slave peripheral, accessible through 32-bit word single accesses only (otherwise an AHB bus error is generated, and write accesses are ignored).

The PKA in STM32U385 is intended for the computation of cryptographic public key primitives, specifically those related to RSA, Diffie-Hellmann, or ECC (elliptic curve cryptography) over GF(p) (Galois fields).

The PKA main features in STM32U385 are:
• Acceleration of RSA, DH, and ECC over GF(p) operations, based on the Montgomery method for fast
modular multiplications. More specifically:
– RSA modular exponentiation, RSA Chinese remainder theorem (CRT) exponentiation
– ECC scalar multiplication, point on curve check, complete addition, double base ladder, projective to affine
– ECDSA signature generation and verification
• Capability to handle operands up to 4160 bits for RSA/DH and 640 bits for ECC.
• When manipulating secrets: protection against side-channel attacks (SCA), including differential power analysis (DPA), certified SESIP, and PSA security assurance level 3. Applicable to modular exponentiation, ECC scalar multiplication, and ECDSA signature generation
• Arithmetic and modular operations such as addition, subtraction, multiplication, modular reduction, modular
inversion, comparison, and Montgomery multiplication.
• Built-in Montgomery domain inward and outward transformations.
• AMBA® AHB slave peripheral, accessible through 32-bit word single accesses only (otherwise an AHB bus
error is generated, and write accesses are ignored).
• Support for CCB chaining operations required to protect private key used in PKA protected operations
• Hardware protections to monitor usage of private keys during protected operation initialization.

 

You can find the svd file in  CAD Resources.

KDJEM1_0-1768310780121.png

Is my reply answer your request?

Thank you.

Kaouthar

 

 

To give better visibility on the answered topics, please click on Accept as Solution on the reply which solved your issue or answered your question.