欢迎访问ic37.com |
会员登录 免费注册
发布采购

SI1034-A-GM 参数 Datasheet PDF下载

SI1034-A-GM图片预览
型号: SI1034-A-GM
PDF下载: 下载PDF文件 查看货源
内容描述: 超低功耗128K , LCD MCU系列 [Ultra Low Power 128K, LCD MCU Family]
分类和应用:
文件页数/大小: 538 页 / 4351 K
品牌: SILABS [ SILICON LABORATORIES ]
 浏览型号SI1034-A-GM的Datasheet PDF文件第178页浏览型号SI1034-A-GM的Datasheet PDF文件第179页浏览型号SI1034-A-GM的Datasheet PDF文件第180页浏览型号SI1034-A-GM的Datasheet PDF文件第181页浏览型号SI1034-A-GM的Datasheet PDF文件第183页浏览型号SI1034-A-GM的Datasheet PDF文件第184页浏览型号SI1034-A-GM的Datasheet PDF文件第185页浏览型号SI1034-A-GM的Datasheet PDF文件第186页  
Si102x/3x
The key and data to be encrypted should be stored as an array with the first byte to be encrypted at the
lowest address. The value of the big endian bit of the DMACF0 SFR does not matter. The AES block uses
only one byte transfers, so there is no particular endianness associated with a one byte transfer.
The dummy data can be zeros or any value. The encrypted data is discarded, so the value of the dummy
data does not mater.
It is not strictly required to use DMA channels 0, 1, and 2. Any three DMA channels may be used. The
internal state machine of the AES module will send the peripheral requests in the required order.
If the other DMA channels are going to be used concurrently with encryption, then only the bits corre-
sponding to the encryption channels should be manipulated in DM0AEN and DMA0NT
SFR
s.
14.2.2. Key Inversion using SFRs
Normally, the AES block is used with the DMA. This provides the best performance and lowest power con-
sumption. However, it is also possible to use the DMA with direct SFR access. The steps are documented
here for completeness.
Steps to generate the decryption key from the encryption key using SFR access follow:
First configure the AES block for key inversion:

Reset
AES module by writing 0x00 to AES0BCFG.

Configure the AES Module data flow for inverse key generation by writing 0x04 to AES0DCFG.

Write key size to bits 1 and 0 of AES0BCFG.

Configure the AES core for encryption by setting bit 2 of AES0BCFG.

Enable the AES core by setting bit 3 of AES0BCFG.
Write the dummy data alternating with key data:

Write
the first dummy byte to AES0BIN

Write the first key byte to AES0KIN

Repeat until all dummy data bytes are written
If using 192-bit and 256-bit key, write remaining key bytes to AES0KIN:
Wait on AES done interrupt or poll bit 5 of AES0BCFG
Read first byte of the decryption key from AES0YOUT
182
Rev. 0.3